VYPR
Moderate severityNVD Advisory· Published Dec 1, 2025· Updated Dec 2, 2025

Grav vulnerable to Information Disclosure via IDOR in Grav Admin Panel

CVE-2025-66306

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, there is an IDOR (Insecure Direct Object Reference) vulnerability in the Grav CMS Admin Panel which allows low-privilege users to access sensitive information from other accounts. Although direct account takeover is not possible, admin email addresses and other metadata can be exposed, increasing the risk of phishing, credential stuffing, and social engineering. This vulnerability is fixed in 1.8.0-beta.27.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
getgrav/gravPackagist
< 1.8.0-beta.271.8.0-beta.27

Affected products

1

Patches

1
b7e1958a6e80

Merge branch 'fix/GHSA-4cwq-j7jv-qmwg-title-email-leak' into 1.8

https://github.com/getgrav/gravAndy MillerNov 30, 2025via ghsa
1 file changed · +1 1
  • system/blueprints/flex/user-accounts.yaml+1 1 modified
    @@ -72,7 +72,7 @@ config:
         # Edit view
         edit:
           title:
    -        template: "{{ form.value('fullname') ?? form.value('username') }} &lt;{{ form.value('email') }}&gt;"
    +        template: "{{ form.value('fullname') ?? form.value('username') }}"
     
         # Configure view
         configure:
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.