Deserialization Vulnerability in Grav CMS by Grav
CVE-2026-7317

2.3LOW

Key Information:

Vendor

Grav

Status
Vendor
CVE Published:
28 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-7317?

A deserialization vulnerability was identified in Grav CMS versions up to 1.7.49.5 and 2.0.0-beta.1, specifically within the FileCache::doGet function located in the file system/src/Grav/Framework/Cache/Adapter/FileCache.php. This issue allows an attacker to manipulate cache value handling and potentially conduct remote attacks. Although exploitation may require significant skill and planning, the vulnerability has been publicly disclosed and is being actively monitored. Users are advised to upgrade to version 2.0.0-beta.2 or later, which includes a fix identified by patch c66dfeb5f to mitigate this risk.

Affected Version(s)

CMS 1.7.49.0

CMS 1.7.49.1

CMS 1.7.49.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
2.3
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

s4nnty (VulDB User)
.