CVE-2024-28116
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
21/03/2024
Last modified:
02/01/2025
Description
Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:* | 1.7.45 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e
- https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh
- https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e
- https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh



