CVE-2025-66300
HIGHGrav <1.8.0-beta.27 - Info Disclosure
Title source: llmDescription
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password. This vulnerability is fixed in 1.8.0-beta.27.
Scores
CVSS v3
8.5
EPSS
0.0009
EPSS Percentile
25.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (3)
getgrav/grav
1.8.0 beta1 (26 CPE variants)
getgrav/grav
< 1.8.0
getgrav/grav
0 - 1.8.0-beta.27Packagist
Published
Dec 01, 2025
Tracked Since
Feb 18, 2026