Authorization Flaw in Grav Web Platform Affects User Permissions
CVE-2025-66301

8.6HIGH

Key Information:

Vendor

Getgrav

Status
Vendor
CVE Published:
1 December 2025

What is CVE-2025-66301?

Grav, a file-based web platform, has a vulnerability that arises from improper authorization checks. Prior to version 1.8.0-beta.27, editors lacking full permissions were able to modify crucial fields in a POST request to /admin/pages/{page_name}. This allowed them to change form functionality by altering the YAML frontmatter content, specifically within the data[_json][header][form] section. Such modifications could potentially lead to significant security risks, enabling unauthorized access or actions. The issue has been resolved in version 1.8.0-beta.27.

Affected Version(s)

grav < 1.8.0-beta.27

References

EPSS Score

25% chance of being exploited in the next 30 days.

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.