Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. A user with the create user permission can create a new account using the same username as an existing administrator account, set a new password/email, and then log in as that administrator. This effectively allows privilege escalation from limited user-manager permissions to full administrator access. This vulnerability is fixed in 1.8.0-beta.27.
History

Thu, 04 Dec 2025 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta10:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta11:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta12:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta13:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta14:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta15:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta16:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta17:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta18:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta19:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta1:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta20:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta21:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta22:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta23:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta24:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta25:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta26:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta2:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta3:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta4:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta5:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta6:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta7:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta8:*:*:*:*:*:*
cpe:2.3:a:getgrav:grav:1.8.0:beta9:*:*:*:*:*:*

Tue, 02 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Getgrav
Getgrav grav
Vendors & Products Getgrav
Getgrav grav

Mon, 01 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. A user with the create user permission can create a new account using the same username as an existing administrator account, set a new password/email, and then log in as that administrator. This effectively allows privilege escalation from limited user-manager permissions to full administrator access. This vulnerability is fixed in 1.8.0-beta.27.
Title Grav vulnerable to Privilege Escalation in Grav Admin: Missing Username Uniqueness Check Allows Admin Account Takeover
Weaknesses CWE-266
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-01T21:03:07.231Z

Updated: 2025-12-02T14:06:13.212Z

Reserved: 2025-11-26T23:11:46.393Z

Link: CVE-2025-66296

cve-icon Vulnrichment

Updated: 2025-12-02T14:06:07.171Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-01T21:15:53.157

Modified: 2025-12-04T18:33:10.217

Link: CVE-2025-66296

cve-icon Redhat

No data.