PT-2025-32177 · Grav Cms · Grav Cms
Binneko
·
Published
2025-08-06
·
Updated
2026-04-03
·
CVE-2025-50286
CVSS v3.1
8.1
High
| AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions: Grav CMS versions 1.7.48
Description: A Remote Code Execution (RCE) issue exists in Grav CMS version 1.7.48. An authenticated administrator can upload a malicious plugin through the
/admin/tools/direct-install API endpoint. Upon upload, the plugin is automatically extracted and loaded, enabling arbitrary PHP code execution and potential reverse shell access. The /admin/tools/direct-install endpoint accepts plugin uploads, and the plugin variable is involved in the process.Recommendations: Update to a newer version that contains a fix for this vulnerability. As a temporary workaround, restrict access to the
/admin/tools/direct-install endpoint.Exploit
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Grav Cms