CVE-2025-66296
BaseFortify
Publication date: 2025-12-01
Last updated on: 2025-12-04
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| getgrav | grav | From 1.7.49.5 (inc) to 1.8.0 (exc) |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in Grav's Admin plugin before version 1.8.0-beta.27. It occurs because the system does not validate username uniqueness when creating new users. As a result, a user who has permission to create users can create a new account with the same username as an existing administrator, set a new password and email for that account, and then log in as that administrator. This allows the user to escalate their privileges from limited user-manager permissions to full administrator access.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with limited permissions to gain full administrator access to the Grav platform. This means they can control the entire system, potentially modify or delete content, change configurations, and access sensitive data, leading to a complete compromise of the affected web platform.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Grav to version 1.8.0-beta.27 or later, where the vulnerability is fixed. Until then, restrict the create user permission to trusted users only to prevent unauthorized creation of accounts with duplicate administrator usernames.