CVE-2025-66302

MEDIUM

Grav <1.8.0-beta.27 - Path Traversal

Title source: llm

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A path traversal vulnerability has been identified in Grav CMS, allowing authenticated attackers with administrative privileges to read arbitrary files on the underlying server filesystem. This vulnerability arises due to insufficient input sanitization in the backup tool, where user-supplied paths are not properly restricted, enabling access to files outside the intended webroot directory. The impact of this vulnerability depends on the privileges of the user account running the application. This vulnerability is fixed in 1.8.0-beta.27.

Scores

CVSS v3 6.8
EPSS 0.0008
EPSS Percentile 23.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (3)
getgrav/grav 1.8.0 beta1 (26 CPE variants)
getgrav/grav < 1.8.0
getgrav/grav 0 - 1.8.0-beta.27Packagist
Published Dec 01, 2025
Tracked Since Feb 18, 2026