CVE-2025-66294
HIGHCVSS v3
8.8
HIGH
EPSS Score
38.3%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Server-Side Template Injection (SSTI) vulnerability exists in Grav that allows authenticated attackers with editor permissions to execute arbitrary commands on the server and, under certain conditions, may also be exploited by unauthenticated attackers. This vulnerability stems from weak regex validation in the cleanDangerousTwig method. This vulnerability is fixed in 1.8.0-beta.27.
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 12/1/2025
- Last Modified
- 12/4/2025
Frequently Asked Questions
What is CVE-2025-66294?
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a Server-Side Template Injection (SSTI) vulnerability exists in Grav that allows authenticated attackers with editor permissions to execute arbitrary commands on the server and, under certain conditions, may also be exploited by unauthenticated attackers. This vulnerability stems from weak regex validation in the cleanDangerousTwig method. This vulnerability is fixed in 1.8.0-beta.27.
Is CVE-2025-66294 actively exploited?
Active exploitation of CVE-2025-66294 has not been confirmed. The EPSS score is 38.3%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-66294?
CVE-2025-66294 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.
Is CVE-2025-66294 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.