Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to privilege escalation if an attacker can crack these password hashes. This vulnerability is fixed in 1.8.0-beta.27.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 01 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description Grav is a file-based Web platform. Prior to 1.8.0-beta.27, users with read access on the user account management section of the admin panel can view the password hashes of all users, including the admin user. This exposure can potentially lead to privilege escalation if an attacker can crack these password hashes. This vulnerability is fixed in 1.8.0-beta.27.
Title Grav Exposes Password Hashes Leading to privilege escalation
Weaknesses CWE-200
CWE-201
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-01T21:40:11.511Z

Reserved: 2025-11-26T23:11:46.395Z

Link: CVE-2025-66304

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-01T22:15:50.080

Modified: 2025-12-01T22:15:50.080

Link: CVE-2025-66304

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.