Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q3qx-cp62-f6m7 | Grav Admin Plugin vulnerable to User Enumeration & Email Disclosure |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 02 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrav
Getgrav grav Getgrav grav-plugin-admin |
|
| Vendors & Products |
Getgrav
Getgrav grav Getgrav grav-plugin-admin |
Mon, 01 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a user enumeration and email disclosure vulnerability exists in Grav. The "Forgot Password" functionality at /admin/forgot leaks information about valid usernames and their associated email addresses through distinct server responses. This allows an attacker to enumerate users and disclose sensitive email addresses, which can be leveraged for targeted attacks such as password spraying, phishing, or social engineering. This vulnerability is fixed in 1.8.0-beta.27. | This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a user enumeration and email disclosure vulnerability exists in Grav. The "Forgot Password" functionality at /admin/forgot leaks information about valid usernames and their associated email addresses through distinct server responses. This allows an attacker to enumerate users and disclose sensitive email addresses, which can be leveraged for targeted attacks such as password spraying, phishing, or social engineering. This vulnerability is fixed in 1.11.0-beta.1. |
| Title | Grav vulnerable to User Enumeration & Email Disclosure | Grav Admin Plugin vulnerable to User Enumeration & Email Disclosure |
| References |
|
Mon, 01 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a user enumeration and email disclosure vulnerability exists in Grav. The "Forgot Password" functionality at /admin/forgot leaks information about valid usernames and their associated email addresses through distinct server responses. This allows an attacker to enumerate users and disclose sensitive email addresses, which can be leveraged for targeted attacks such as password spraying, phishing, or social engineering. This vulnerability is fixed in 1.8.0-beta.27. | |
| Title | Grav vulnerable to User Enumeration & Email Disclosure | |
| Weaknesses | CWE-204 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-02T20:07:53.150Z
Reserved: 2025-11-26T23:11:46.396Z
Link: CVE-2025-66307
Updated: 2025-12-02T20:07:42.654Z
Status : Awaiting Analysis
Published: 2025-12-01T22:15:50.570
Modified: 2025-12-02T17:16:29.163
Link: CVE-2025-66307
No data.
OpenCVE Enrichment
Updated: 2025-12-02T11:58:53Z
Github GHSA