CVE-2025-66303
BaseFortify
Publication date: 2025-12-01
Last updated on: 2025-12-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| getgrav | grav | to 1.8.0 (exc) |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
| getgrav | grav | 1.8.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Grav, a file-based web platform, involves improper sanitization of the scheduled_at parameter used for cron expressions. By injecting malicious input such as a single quote into this parameter, the admin panel becomes non-functional, causing a Denial of Service (DoS). Recovery requires manual modification of the backup.yaml file on the host server. The issue is fixed in version 1.8.0-beta.27.
How can this vulnerability impact me? :
The vulnerability can cause a Denial of Service (DoS) by making the Grav admin panel non-functional, which disrupts administrative operations. This can lead to significant operational downtime and requires manual intervention on the host server to fix the corrupted cron expression.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade Grav to version 1.8.0-beta.27 or later. If the admin panel is already non-functional due to this issue, manually access the host server and modify the backup.yaml file to correct the corrupted cron expression caused by the malicious scheduled_at parameter input.