8.5

CVSS3.1

CVE-2025-66300 - Grav is vulnerable to Arbitrary File Read

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, A low privilege user account with page editing privilege can read any server files using "Frontmatter" form. This includes Grav user account files (/grav/user/accounts/*.yaml), which store hashed user password, 2FA secret, and the password …

📅 Published: Dec. 1, 2025, 9:19 p.m. 🔄 Last Modified: Dec. 3, 2025, 3:45 p.m.

8.8

CVSS3.1

CVE-2025-66299 - Security Sandbox Bypass with SSTI (Server Side Template Injection) in the Grav CMS

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, Grav CMS is vulnerable to a Server-Side Template Injection (SSTI) that allows any authenticated user with editor permissions to execute arbitrary code on the remote server, bypassing the existing security sandbox. Since the security sandbox…

📅 Published: Dec. 1, 2025, 9:15 p.m. 🔄 Last Modified: Dec. 3, 2025, 3:41 p.m.

7.7

CVSS4.0

CVE-2025-66298 - Grav is vulnerable to Server-Side Template Injection (SSTI) via Forms

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, having a simple form on site can reveal the whole Grav configuration details (including plugin configuration details) by using the correct POST payload to exploit a Server-Side Template (SST) vulnerability. Sensitive information may be cont…

📅 Published: Dec. 1, 2025, 9:10 p.m. 🔄 Last Modified: Dec. 3, 2025, 3:51 p.m.

7.4

CVSS4.0

CVE-2025-66297 - Grav vulnerable to Privilege Escalation and Authenticated Remote Code Execution via Twig Injection

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a user with admin panel access and permissions to create or edit pages in Grav CMS can enable Twig processing in the page frontmatter. By injecting malicious Twig expressions, the user can escalate their privileges to admin or execute arbit…

📅 Published: Dec. 1, 2025, 9:05 p.m. 🔄 Last Modified: Dec. 3, 2025, 3:58 p.m.

8.8

CVSS3.1

CVE-2025-66296 - Grav vulnerable to Privilege Escalation in Grav Admin: Missing Username Uniqueness Check Allows Adm…

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. A user with the create user permission can create a new account using the same username as an exist…

📅 Published: Dec. 1, 2025, 9:03 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:33 p.m.

8.7

CVSS4.0

CVE-2025-66294 - Grav is vulnerable to RCE via SSTI through Twig Sandbox Bypass

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Server-Side Template Injection (SSTI) vulnerability exists in Grav that allows authenticated attackers with editor permissions to execute arbitrary commands on the server and, under certain conditions, may also be exploited by unauthentic…

📅 Published: Dec. 1, 2025, 8:52 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:36 p.m.

8.8

CVSS3.1

CVE-2025-66295 - Grav vulnerable to Path traversal / arbitrary YAML write via user creation leading to Account Takeo…

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, when a user with privilege of user creation creates a new user through the Admin UI and supplies a username containing path traversal sequences (for example ..\Nijat or ../Nijat), Grav writes the account YAML file to an unintended path outs…

📅 Published: Dec. 1, 2025, 8:46 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:34 p.m.

7.5

CVSS3.1

CVE-2025-14874 - Nodemailer: nodemailer: denial of service via crafted email address header

A flaw was found in Nodemailer. This vulnerability allows a denial of service (DoS) via a crafted email address header that triggers infinite recursion in the address parser.

📅 Published: Dec. 1, 2025, 8:44 p.m. 🔄 Last Modified: Jan. 8, 2026, 3:15 a.m.

6.8

CVSS3.1

CVE-2025-66206 - Frappe vulnerable to a path traversal allowing reading certain files

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, certain requests were vulnerable to path traversal attacks, wherein some files from the server could be retrieved if the full path was known. Sites hosted on Frappe Cloud, and even other setups that are behind a reverse…

📅 Published: Dec. 1, 2025, 8:29 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:41 p.m.

7.1

CVSS3.1

CVE-2025-66205 - Frappe has the possibility of SQL Injection due to improper validations

Frappe is a full-stack web application framework. Prior to 15.86.0 and 14.99.2, a certain endpoint was vulnerable to error-based SQL injection due to lack of validation of parameters. Some information like version could be retrieved. This vulnerability is fixed in 15.86.0 and 14.99.2.

📅 Published: Dec. 1, 2025, 8:26 p.m. 🔄 Last Modified: Dec. 4, 2025, 6:49 p.m.
Total resulsts: 349182
Page 2864 of 34,919
« previous page » next page
Filters