CVE-2025-66301
CRITICALCVSS v3
9.6
CRITICAL
EPSS Score
31.9%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now able to change the functioning of the form through modifying the content of the data[_json][header][form] which is the YAML frontmatter which includes the process section which dictates what happens after a user submits the form which include some imp
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 12/1/2025
- Last Modified
- 12/3/2025
Frequently Asked Questions
What is CVE-2025-66301?
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now able to change the functioning of the form through modifying the content of the data[_json][header][form] which is the YAML frontmatter which includes the process section which dictates what happens after a user submits the form which include some imp
Is CVE-2025-66301 actively exploited?
Active exploitation of CVE-2025-66301 has not been confirmed. The EPSS score is 31.9%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-66301?
CVE-2025-66301 has a CVSS v3 base score of 9.6 (CRITICAL severity), with vector string 3.1.
Is CVE-2025-66301 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.