CVE-2025-66300
01.12.2025, 22:15
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. This vulnerability is fixed in 1.8.0-beta.27.
| Vendor | Product | Version |
|---|---|---|
| getgrav | grav | 𝑥 < 1.8.0 |
| getgrav | grav | 1.8.0:beta1 |
| getgrav | grav | 1.8.0:beta10 |
| getgrav | grav | 1.8.0:beta11 |
| getgrav | grav | 1.8.0:beta12 |
| getgrav | grav | 1.8.0:beta13 |
| getgrav | grav | 1.8.0:beta14 |
| getgrav | grav | 1.8.0:beta15 |
| getgrav | grav | 1.8.0:beta16 |
| getgrav | grav | 1.8.0:beta17 |
| getgrav | grav | 1.8.0:beta18 |
| getgrav | grav | 1.8.0:beta19 |
| getgrav | grav | 1.8.0:beta2 |
| getgrav | grav | 1.8.0:beta20 |
| getgrav | grav | 1.8.0:beta21 |
| getgrav | grav | 1.8.0:beta22 |
| getgrav | grav | 1.8.0:beta23 |
| getgrav | grav | 1.8.0:beta24 |
| getgrav | grav | 1.8.0:beta25 |
| getgrav | grav | 1.8.0:beta26 |
| getgrav | grav | 1.8.0:beta3 |
| getgrav | grav | 1.8.0:beta4 |
| getgrav | grav | 1.8.0:beta5 |
| getgrav | grav | 1.8.0:beta6 |
| getgrav | grav | 1.8.0:beta7 |
| getgrav | grav | 1.8.0:beta8 |
| getgrav | grav | 1.8.0:beta9 |
𝑥
= Vulnerable software versions