Lucene search

K

5 matches found

CVE
CVE
added 2023/06/14 11:15 p.m.56 views

CVE-2023-34448

Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default filter() function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke ...

8.8CVSS7.7AI score0.07669EPSS
CVE
CVE
added 2023/06/14 10:15 p.m.48 views

CVE-2023-34252

Grav is a flat-file content management system. Prior to version 1.7.42, there is a logic flaw in the GravExtension.filterFilter() function whereby validation against a denylist of unsafe functions is only performed when the argument passed to filter is a string. However, passing an array as a calla...

8.8CVSS8AI score0.00414EPSS
CVE
CVE
added 2023/06/14 10:15 p.m.42 views

CVE-2023-34251

Grav is a flat-file content management system. Versions prior to 1.7.42 are vulnerable to server side template injection. Remote code execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges. Version 1.7.42 contains a fix for this issu...

9.9CVSS8.8AI score0.02967EPSS
CVE
CVE
added 2023/06/14 11:15 p.m.42 views

CVE-2023-34253

Grav is a flat-file content management system. Prior to version 1.7.42, the denylist introduced in commit 9d6a2d to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in multiple ways -- (1) using unsafe functions that...

8.8CVSS8.1AI score0.01844EPSS
CVE
CVE
added 2023/06/14 11:15 p.m.40 views

CVE-2023-34452

Grav is a flat-file content management system. In versions 1.7.42 and prior, the "/forgot_password" page has a self-reflected cross-site scripting vulnerability that can be exploited by injecting a script into the "email" parameter of the request. While this vulnerability can potentially allow an a...

6.1CVSS6AI score0.008EPSS