Lucene search

K

8 matches found

CVE
CVE
added 2024/03/21 2:52 a.m.66 views

CVE-2024-27923

Grav is a content management system (CMS). Prior to version 1.7.43, users who may write a page may use the frontmatter feature due to insufficient permission validation and inadequate file name validation. This may lead to remote code execution. Version 1.7.43 fixes this issue.

8.8CVSS9AI score0.07188EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.64 views

CVE-2024-28116

Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing secur...

8.8CVSS9AI score0.54001EPSS
CVE
CVE
added 2024/05/15 5:15 p.m.60 views

CVE-2024-34082

Grav is a file-based Web platform. Prior to version 1.7.46, a low privilege user account with page edit privilege can read any server files using Twig Syntax. This includes Grav user account files - /grav/user/accounts/*.yaml. This file stores hashed user password, 2FA secret, and the password rese...

9.9CVSS6.8AI score0.00112EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.55 views

CVE-2024-27921

Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses ...

8.8CVSS8.9AI score0.06073EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.55 views

CVE-2024-28118

Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from Grav context, an attacker can redefine config variable. As a result, attacker can bypass a previous SSTI mitigation. Twig processing of static pages can ...

8.8CVSS9.1AI score0.00443EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.53 views

CVE-2024-28119

Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from grav context, an attacker can redefine the escape function and execute arbitrary commands. Twig processing of static pages can be enabled in the front ma...

8.8CVSS9.1AI score0.01354EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.44 views

CVE-2024-28117

Grav is an open-source, flat-file content management system. Prior to version 1.7.45, Grav validates accessible functions through the Utils::isDangerousFunction function, but does not impose restrictions on twig functions like twig_array_map, allowing attackers to bypass the validation and execute ...

8.8CVSS9.2AI score0.00464EPSS
CVE
CVE
added 2024/02/09 7:15 a.m.32 views

CVE-2023-31506

A cross-site scripting (XSS) vulnerability in Grav versions 1.7.44 and before, allows remote authenticated attackers to execute arbitrary web scripts or HTML via the onmouseover attribute of an ISINDEX element.

5.4CVSS5.1AI score0.00046EPSS