CVE-2025-66295
01.12.2025, 21:15
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, when a user with privilege of user creation creates a new user through the Admin UI and supplies a username containing path traversal sequences (for example ..\Nijat or ../Nijat), Grav writes the account YAML file to an unintended path outside user/accounts/. The written YAML can contain account fields such as email, fullname, twofa_secret, and hashed_password. This vulnerability is fixed in 1.8.0-beta.27.
| Vendor | Product | Version |
|---|---|---|
| getgrav | grav | 1.7.49.5 ≤ 𝑥 < 1.8.0 |
| getgrav | grav | 1.8.0:beta1 |
| getgrav | grav | 1.8.0:beta10 |
| getgrav | grav | 1.8.0:beta11 |
| getgrav | grav | 1.8.0:beta12 |
| getgrav | grav | 1.8.0:beta13 |
| getgrav | grav | 1.8.0:beta14 |
| getgrav | grav | 1.8.0:beta15 |
| getgrav | grav | 1.8.0:beta16 |
| getgrav | grav | 1.8.0:beta17 |
| getgrav | grav | 1.8.0:beta18 |
| getgrav | grav | 1.8.0:beta19 |
| getgrav | grav | 1.8.0:beta2 |
| getgrav | grav | 1.8.0:beta20 |
| getgrav | grav | 1.8.0:beta21 |
| getgrav | grav | 1.8.0:beta22 |
| getgrav | grav | 1.8.0:beta23 |
| getgrav | grav | 1.8.0:beta24 |
| getgrav | grav | 1.8.0:beta25 |
| getgrav | grav | 1.8.0:beta26 |
| getgrav | grav | 1.8.0:beta3 |
| getgrav | grav | 1.8.0:beta4 |
| getgrav | grav | 1.8.0:beta5 |
| getgrav | grav | 1.8.0:beta6 |
| getgrav | grav | 1.8.0:beta7 |
| getgrav | grav | 1.8.0:beta8 |
| getgrav | grav | 1.8.0:beta9 |
𝑥
= Vulnerable software versions