Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23842 | A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access. |
| Link | Providers |
|---|---|
| https://github.com/binneko/CVE-2025-50286 |
|
Fri, 07 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav |
|
| CPEs | cpe:2.3:a:getgrav:grav:1.7.48:*:*:*:*:*:*:* | |
| Vendors & Products |
Getgrav
Getgrav grav |
Thu, 07 Aug 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 06 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| Metrics |
cvssV3_1
|
Wed, 06 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-07T04:20:30.841Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50286
Updated: 2025-08-06T14:56:13.692Z
Status : Analyzed
Published: 2025-08-06T15:15:32.297
Modified: 2025-11-07T19:18:37.380
Link: CVE-2025-50286
No data.
OpenCVE Enrichment
No data.
EUVD