Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. A user with the create user permission can create a new account using the same username as an existing administrator account, set a new password/email, and then log in as that administrator. This effectively allows privilege escalation from limited user-manager permissions to full administrator access. This vulnerability is fixed in 1.8.0-beta.27.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-01 21:15
Updated : 2025-12-04 18:33
NVD link : CVE-2025-66296
Mitre link : CVE-2025-66296
CVE.ORG link : CVE-2025-66296
JSON object : View
Products Affected
getgrav
- grav
CWE
CWE-266
Incorrect Privilege Assignment
