CVE-2023-34448
HIGHGrav < 1.7.42 - Remote Code Execution
Title source: ruleDescription
Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default `filter()` function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions, thereby allowing for remote code execution. A patch in version 1.74.2 overrides the built-in Twig `map()` and `reduce()` filter functions in `system/src/Grav/Common/Twig/Extension/GravExtension.php` to validate the argument passed to the filter in `$arrow`.
Scores
CVSS v3
8.8
EPSS
0.0885
EPSS Percentile
92.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-1336
CWE-20
CWE-94
Status
published
Products (2)
getgrav/grav
< 1.7.42
getgrav/grav
0 - 1.7.42Packagist
Published
Jun 14, 2023
Tracked Since
Feb 18, 2026