CVE-2025-66301
BaseFortify
Publication date: 2025-12-01
Last updated on: 2025-12-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| getgrav | grav | to 1.8.0 (exc) |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Grav, a file-based web platform, occurs because of improper authorization checks when modifying critical fields via a POST request to /admin/pages/{page_name}. An editor with limited permissions to change only basic content can exploit this flaw to modify the YAML frontmatter, specifically the process section of a form. This section controls what happens after a user submits the form, and altering it can change the form's behavior, potentially leading to further security issues. The vulnerability is fixed in version 1.8.0-beta.27.
How can this vulnerability impact me? :
This vulnerability allows an editor with limited permissions to escalate their control by modifying the form's processing behavior after submission. This could lead to unauthorized actions being executed, potentially resulting in further vulnerabilities or exploitation within the web platform, compromising the integrity and security of the application.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Grav to version 1.8.0-beta.27 or later, as this version contains the fix for the improper authorization checks vulnerability.