CVE-2025-66305
01.12.2025, 22:15
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Denial of Service (DoS) vulnerability was identified in the "Languages" submenu of the Grav admin configuration panel (/admin/config/system). Specifically, the Supported parameter fails to properly validate user input. If a malformed value is insertedsuch as a single forward slash (/) or an XSS test stringit causes a fatal regular expression parsing error on the server. This leads to application-wide failure due to the use of the preg_match() function with an improperly constructed regular expression, resulting in an error. Once triggered, the site becomes completely unavailable to all users. This vulnerability is fixed in 1.8.0-beta.27.Enginsight
| Vendor | Product | Version |
|---|---|---|
| getgrav | grav | 1.7.48 ≤ 𝑥 < 1.8.0 |
| getgrav | grav | 1.8.0:beta1 |
| getgrav | grav | 1.8.0:beta10 |
| getgrav | grav | 1.8.0:beta11 |
| getgrav | grav | 1.8.0:beta12 |
| getgrav | grav | 1.8.0:beta13 |
| getgrav | grav | 1.8.0:beta14 |
| getgrav | grav | 1.8.0:beta15 |
| getgrav | grav | 1.8.0:beta16 |
| getgrav | grav | 1.8.0:beta17 |
| getgrav | grav | 1.8.0:beta18 |
| getgrav | grav | 1.8.0:beta19 |
| getgrav | grav | 1.8.0:beta2 |
| getgrav | grav | 1.8.0:beta20 |
| getgrav | grav | 1.8.0:beta21 |
| getgrav | grav | 1.8.0:beta22 |
| getgrav | grav | 1.8.0:beta23 |
| getgrav | grav | 1.8.0:beta24 |
| getgrav | grav | 1.8.0:beta25 |
| getgrav | grav | 1.8.0:beta26 |
| getgrav | grav | 1.8.0:beta3 |
| getgrav | grav | 1.8.0:beta4 |
| getgrav | grav | 1.8.0:beta5 |
| getgrav | grav | 1.8.0:beta6 |
| getgrav | grav | 1.8.0:beta7 |
| getgrav | grav | 1.8.0:beta8 |
| getgrav | grav | 1.8.0:beta9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration