Modern, Crazy Fast, Ridiculously Easy and Amazingly Powerful Flat-File CMS
getgrav/[email protected] has vulnerabilities — update to latest
Update to >= 1.8.0-beta.27 to fix known vulnerabilities
| Severity | ID | Summary | Fixed in |
|---|---|---|---|
| medium | CVE-2025-66306 | Grav vulnerable to Information Disclosure via IDOR in Grav Admin Panel | 1.8.0-beta.27 |
| medium | CVE-2025-66309 | Grav is vulnerable to Cross-Site Scripting (XSS) Reflected endpoint /admin/pages/[page], parameter data[header][content][items], located in the "Blog Config" tab | 1.8.0-beta.27 |
| high | CVE-2025-66294 | Grav is vulnerable to RCE via SSTI through Twig Sandbox Bypass |
Get this data programmatically — free, no authentication.
curl https://depscope.dev/api/check/composer/getgrav/gravLast updated · 2026-04-29T17:47:42+00:00
| medium | CVE-2025-66310 | Grav vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/pages/[page]` parameter `data[header][template]` in Advanced Tab | 1.8.0-beta.27 |
| high | CVE-2025-66298 | Grav is vulnerable to Server-Side Template Injection (SSTI) via Forms | 1.8.0-beta.27 |
| high | CVE-2025-66297 | Grav vulnerable to Privilege Escalation and Authenticated Remote Code Execution via Twig Injection | 1.8.0-beta.27 |
| high | CVE-2025-66296 | Grav vulnerable to Privilege Escalation in Grav Admin: Missing Username Uniqueness Check Allows Admin Account Takeover | 1.8.0-beta.27 |
| high | CVE-2025-66299 | Grav is Vulnerable to Security Sandbox Bypass with SSTI (Server Side Template Injection) | 1.8.0-beta.27 |
| medium | CVE-2025-66304 | Grav Exposes Password Hashes Leading to privilege escalation | 1.8.0-beta.27 |
| medium | CVE-2025-66308 | Grav Admin Plugin vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/config/site` parameter `data[taxonomies]` | 1.8.0-beta.27 |
| high | CVE-2025-66295 | Grav vulnerable to Path traversal / arbitrary YAML write via user creation leading to Account Takeover / System Corruption | 1.8.0-beta.27 |
| medium | CVE-2025-66302 | Grav vulnerable to Path Traversal allowing server files backup | 1.8.0-beta.27 |
| high | CVE-2025-66305 | Grav vulnerable to Denial of Service via Improper Input Handling in 'Supported' Parameter | 1.8.0-beta.27 |
| medium | CVE-2025-66311 | Grav vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/pages/[page]` in Multiples parameters | 1.11.0-beta.1 |
| high | CVE-2025-66300 | Grav is vulnerable to Arbitrary File Read | 1.8.0-beta.27 |
| medium | CVE-2025-66307 | Grav Admin Plugin vulnerable to User Enumeration & Email Disclosure | 1.8.0-beta.27 |
| medium | CVE-2025-66312 | Grav Admin Plugin is vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/accounts/groups/[group]` parameter `data[readableName]` | 1.8.0-beta.27 |
| high | CVE-2025-66301 | Grav has Broken Access Control which allows an Editor to modify the page's YAML Frontmatter to alter form processing actions | 1.8.0-beta.27 |
| medium | CVE-2025-66303 | Grav is vulnerable to a DOS on the admin panel | 1.8.0-beta.27 |