Description
Grav is a flat-file content management system. Versions prior to 1.7.42 are vulnerable to server side template injection. Remote code execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges. Version 1.7.42 contains a fix for this issue.
Published: 2023-06-14
Score: 10 Critical
EPSS: 2.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-1781 Grav is a flat-file content management system. Versions prior to 1.7.42 are vulnerable to server side template injection. Remote code execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges. Version 1.7.42 contains a fix for this issue.
Github GHSA Github GHSA GHSA-f9jf-4cp4-4fq5 Grav Server Side Template Injection (SSTI) vulnerability
History

Fri, 27 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-12-27T16:52:56.757Z

Reserved: 2023-05-31T13:51:51.174Z

Link: CVE-2023-34251

cve-icon Vulnrichment

Updated: 2024-08-02T16:01:54.348Z

cve-icon NVD

Status : Modified

Published: 2023-06-14T22:15:09.333

Modified: 2024-11-21T08:06:51.773

Link: CVE-2023-34251

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses