CVE-2025-66301

CRITICAL

CVSS v3

9.6

CRITICAL

EPSS Score

31.9%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now able to change the functioning of the form through modifying the content of the data[_json][header][form] which is the YAML frontmatter which includes the process section which dictates what happens after a user submits the form which include some imp

Technical Details

CVSS v3 Vector
3.1
Published
12/1/2025
Last Modified
12/3/2025

Frequently Asked Questions

What is CVE-2025-66301?

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, due to improper authorization checks when modifying critical fields on a POST request to /admin/pages/{page_name}, an editor with only permissions to change basic content on the form is now able to change the functioning of the form through modifying the content of the data[_json][header][form] which is the YAML frontmatter which includes the process section which dictates what happens after a user submits the form which include some imp

Is CVE-2025-66301 actively exploited?

Active exploitation of CVE-2025-66301 has not been confirmed. The EPSS score is 31.9%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-66301?

CVE-2025-66301 has a CVSS v3 base score of 9.6 (CRITICAL severity), with vector string 3.1.

Is CVE-2025-66301 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.