CVE-2025-66301
CRITICALGrav CMS Twig SSTI Authenticated Sandbox Bypass RCE
Title source: metasploitDescription
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now able to change the functioning of the form through modifying the content of the data[_json][header][form] which is the YAML frontmatter which includes the process section which dictates what happens after a user submits the form which include some important actions that could lead to further vulnerabilities. This vulnerability is fixed in 1.8.0-beta.27.
Scores
CVSS v3
9.6
EPSS
0.2869
EPSS Percentile
96.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-285
Status
published
Products (3)
getgrav/grav
1.8.0 beta1 (26 CPE variants)
getgrav/grav
< 1.8.0
getgrav/grav
0 - 1.8.0-beta.27Packagist
Published
Dec 01, 2025
Tracked Since
Feb 18, 2026