CVE-2025-66294

HIGH

CVSS v3

8.8

HIGH

EPSS Score

38.3%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Server-Side Template Injection (SSTI) vulnerability exists in Grav that allows authenticated attackers with editor permissions to execute arbitrary commands on the server and, under certain conditions, may also be exploited by unauthenticated attackers. This vulnerability stems from weak regex validation in the cleanDangerousTwig method. This vulnerability is fixed in 1.8.0-beta.27.

Technical Details

CVSS v3 Vector
3.1
Published
12/1/2025
Last Modified
12/4/2025

Frequently Asked Questions

What is CVE-2025-66294?

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Server-Side Template Injection (SSTI) vulnerability exists in Grav that allows authenticated attackers with editor permissions to execute arbitrary commands on the server and, under certain conditions, may also be exploited by unauthenticated attackers. This vulnerability stems from weak regex validation in the cleanDangerousTwig method. This vulnerability is fixed in 1.8.0-beta.27.

Is CVE-2025-66294 actively exploited?

Active exploitation of CVE-2025-66294 has not been confirmed. The EPSS score is 38.3%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-66294?

CVE-2025-66294 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.

Is CVE-2025-66294 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.