Deserialization Vulnerability in Grav CMS by Grav
CVE-2026-7317
Key Information:
Badges
What is CVE-2026-7317?
A deserialization vulnerability was identified in Grav CMS versions up to 1.7.49.5 and 2.0.0-beta.1, specifically within the FileCache::doGet function located in the file system/src/Grav/Framework/Cache/Adapter/FileCache.php. This issue allows an attacker to manipulate cache value handling and potentially conduct remote attacks. Although exploitation may require significant skill and planning, the vulnerability has been publicly disclosed and is being actively monitored. Users are advised to upgrade to version 2.0.0-beta.2 or later, which includes a fix identified by patch c66dfeb5f to mitigate this risk.
Affected Version(s)
CMS 1.7.49.0
CMS 1.7.49.1
CMS 1.7.49.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
