Description

This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a user enumeration and email disclosure vulnerability exists in Grav. The "Forgot Password" functionality at /admin/forgot leaks information about valid usernames and their associated email addresses through distinct server responses. This allows an attacker to enumerate users and disclose sensitive email addresses, which can be leveraged for targeted attacks such as password spraying, phishing, or social engineering. This vulnerability is fixed in 1.11.0-beta.1.

INFO

Published Date :

2025-12-01T21:53:43.510Z

Last Modified :

2025-12-02T20:07:53.150Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-66307 vulnerability.

Vendors Products
Getgrav
  • Grav
  • Grav-plugin-admin
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-66307.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact