Lucene search

K
GetgravGrav

13 matches found

CVE
CVE
added 2021/04/13 8:15 p.m.140 views

CVE-2021-29440

Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance...

8.4CVSS7.5AI score0.20262EPSS
CVE
CVE
added 2022/04/26 4:15 p.m.71 views

CVE-2022-1173

stored xss in GitHub repository getgrav/grav prior to 1.7.33.

8.2CVSS5.8AI score0.00312EPSS
CVE
CVE
added 2024/03/21 2:52 a.m.66 views

CVE-2024-27923

Grav is a content management system (CMS). Prior to version 1.7.43, users who may write a page may use the frontmatter feature due to insufficient permission validation and inadequate file name validation. This may lead to remote code execution. Version 1.7.43 fixes this issue.

8.8CVSS9AI score0.05425EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.63 views

CVE-2024-28116

Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing secur...

8.8CVSS9AI score0.54001EPSS
CVE
CVE
added 2021/11/05 3:15 p.m.59 views

CVE-2021-3924

grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

8.8CVSS7.5AI score0.01152EPSS
CVE
CVE
added 2023/06/14 11:15 p.m.56 views

CVE-2023-34448

Grav is a flat-file content management system. Prior to version 1.7.42, the patch for CVE-2022-2073, a server-side template injection vulnerability in Grav leveraging the default filter() function, did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke ...

8.8CVSS7.7AI score0.07669EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.55 views

CVE-2024-27921

Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses ...

8.8CVSS8.9AI score0.06073EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.55 views

CVE-2024-28118

Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from Grav context, an attacker can redefine config variable. As a result, attacker can bypass a previous SSTI mitigation. Twig processing of static pages can ...

8.8CVSS9.1AI score0.00443EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.53 views

CVE-2024-28119

Grav is an open-source, flat-file content management system. Prior to version 1.7.45, due to the unrestricted access to twig extension class from grav context, an attacker can redefine the escape function and execute arbitrary commands. Twig processing of static pages can be enabled in the front ma...

8.8CVSS9.1AI score0.01354EPSS
CVE
CVE
added 2023/06/14 10:15 p.m.48 views

CVE-2023-34252

Grav is a flat-file content management system. Prior to version 1.7.42, there is a logic flaw in the GravExtension.filterFilter() function whereby validation against a denylist of unsafe functions is only performed when the argument passed to filter is a string. However, passing an array as a calla...

8.8CVSS8AI score0.00414EPSS
CVE
CVE
added 2024/03/21 10:15 p.m.44 views

CVE-2024-28117

Grav is an open-source, flat-file content management system. Prior to version 1.7.45, Grav validates accessible functions through the Utils::isDangerousFunction function, but does not impose restrictions on twig functions like twig_array_map, allowing attackers to bypass the validation and execute ...

8.8CVSS9.2AI score0.00464EPSS
CVE
CVE
added 2023/06/14 11:15 p.m.42 views

CVE-2023-34253

Grav is a flat-file content management system. Prior to version 1.7.42, the denylist introduced in commit 9d6a2d to prevent dangerous functions from being executed via injection of malicious templates was insufficient and could be easily subverted in multiple ways -- (1) using unsafe functions that...

8.8CVSS8.1AI score0.01844EPSS
CVE
CVE
added 2023/07/18 9:15 p.m.31 views

CVE-2023-37897

Grav is a file-based Web-platform built in PHP. Grav is subject to a server side template injection (SSTI) vulnerability. The fix for another SSTI vulnerability using |map, |filter and |reduce twigs implemented in the commit 71bbed1 introduces bypass of the denylist due to incorrect return value fr...

8.8CVSS8AI score0.00093EPSS