CVE-2025-66299
中文标题:
(暂无数据)
英文标题:
Security Sandbox Bypass with SSTI (Server Side Template Injection) in the Grav CMS
漏洞描述
中文描述:
(暂无数据)
英文描述:
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, Grav CMS is vulnerable to a Server-Side Template Injection (SSTI) that allows any authenticated user with editor permissions to execute arbitrary code on the remote server, bypassing the existing security sandbox. Since the security sandbox does not fully protect the Twig object, it is possible to interact with it (e.g., call methods, read/write attributes) through maliciously crafted Twig template directives injected into a web page. This allows an authenticated editor to add arbitrary functions to the Twig attribute system.twig.safe_filters, effectively bypassing the Grav CMS sandbox. This vulnerability is fixed in 1.8.0-beta.27.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| getgrav | grav | < 1.8.0-beta.27 | - | - |
cpe:2.3:a:getgrav:grav:<_1.8.0-beta.27:*:*:*:*:*:*:*
|
| getgrav | grav | * | - | - |
cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*
|
| getgrav | grav | 1.8.0 | - | - |
cpe:2.3:a:getgrav:grav:1.8.0:beta1:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-66299 |
2025-12-03 03:24:29 | 2026-01-12 02:12:24 |
| NVD | nvd_CVE-2025-66299 |
2025-12-04 03:00:02 | 2026-01-12 02:28:04 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 3
- data_sources: ['cve'] -> ['cve', 'nvd']