Cyber Posture

CVE-2025-66295

High

Published: 01 December 2025

Published
01 December 2025
Modified
04 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66295 is a high-severity Path Traversal (CWE-22) vulnerability in Getgrav Grav. Its CVSS base score is 8.8 (High).

Operationally, ranked at the 27.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-22

Validates pathnames and filenames to prevent traversal outside intended directories.

NVD Description

Grav is a file-based Web platform. Prior to 1.8.0-beta.27, when a user with privilege of user creation creates a new user through the Admin UI and supplies a username containing path traversal sequences (for example ..\Nijat or ../Nijat), Grav writes…

more

the account YAML file to an unintended path outside user/accounts/. The written YAML can contain account fields such as email, fullname, twofa_secret, and hashed_password. This vulnerability is fixed in 1.8.0-beta.27.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

Affected Products

getgrav
grav
1.8.0 · 1.7.49.5 — 1.8.0

CVEs Like This One

CVE-2026-42608Same product: Getgrav Grav
CVE-2025-66297Same product: Getgrav Grav
CVE-2025-66294Same product: Getgrav Grav
CVE-2025-50286Same product: Getgrav Grav
CVE-2025-46198Same product: Getgrav Grav
CVE-2026-42611Same product: Getgrav Grav
CVE-2026-42609Same product: Getgrav Grav
CVE-2026-42612Same product: Getgrav Grav
CVE-2026-29924Same product: Getgrav Grav
CVE-2026-44738Same product: Getgrav Grav

References