CVE-2025-50286

HIGH

Grav CMS <1.7.48 - RCE

Title source: llm

Description

A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.

Exploits (4)

exploitdb WORKING POC
by /bin/neko · textwebappsphp
https://www.exploit-db.com/exploits/52402
nomisec WORKING POC 1 stars
by binneko · poc
https://github.com/binneko/CVE-2025-50286
nomisec WORKING POC
by x1o3 · poc
https://github.com/x1o3/CVE-2025-50286
metasploit WORKING POC EXCELLENT
by binneko, x1o3 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/grav_admin_direct_install_rce_cve_2025_50286.rb

Scores

CVSS v3 8.1
EPSS 0.6651
EPSS Percentile 98.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-434
Status published
Products (1)
getgrav/grav 1.7.48
Published Aug 06, 2025
Tracked Since Feb 18, 2026