Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cjcp-qxvg-4rjm | Grav vulnerable to Privilege Escalation in Grav Admin: Missing Username Uniqueness Check Allows Admin Account Takeover |
Thu, 04 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta10:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta11:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta12:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta13:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta14:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta15:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta16:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta17:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta18:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta19:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta1:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta20:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta21:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta22:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta23:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta24:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta25:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta26:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta2:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta3:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta4:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta5:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta6:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta7:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta8:*:*:*:*:*:* cpe:2.3:a:getgrav:grav:1.8.0:beta9:*:*:*:*:*:* |
Tue, 02 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav |
|
| Vendors & Products |
Getgrav
Getgrav grav |
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. A user with the create user permission can create a new account using the same username as an existing administrator account, set a new password/email, and then log in as that administrator. This effectively allows privilege escalation from limited user-manager permissions to full administrator access. This vulnerability is fixed in 1.8.0-beta.27. | |
| Title | Grav vulnerable to Privilege Escalation in Grav Admin: Missing Username Uniqueness Check Allows Admin Account Takeover | |
| Weaknesses | CWE-266 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-02T14:06:13.212Z
Reserved: 2025-11-26T23:11:46.393Z
Link: CVE-2025-66296
Updated: 2025-12-02T14:06:07.171Z
Status : Analyzed
Published: 2025-12-01T21:15:53.157
Modified: 2025-12-04T18:33:10.217
Link: CVE-2025-66296
No data.
OpenCVE Enrichment
Updated: 2025-12-02T11:59:01Z
Github GHSA