Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-66295 | 8.8 HIGH | Grav vulnerable to Path traversal / arbitrary YAML write via user creation leading to Acco |
| CVE-2025-66299 | 8.8 HIGH | Security Sandbox Bypass with SSTI (Server Side Template Injection) in the Grav CMS |
| CVE-2025-66300 | 8.5 HIGH | Grav is vulnerable to Arbitrary File Read |
| CVE-2025-66302 | 6.8 MEDIUM | Grav vulnerable to Path Traversal allowing server files backup |
| CVE-2025-66307 | 6.5 MEDIUM | Grav Admin Plugin vulnerable to User Enumeration & Email Disclosure |
| CVE-2025-66304 | 6.2 MEDIUM | Grav Exposes Password Hashes Leading to privilege escalation |
| CVE-2025-66303 | 4.9 MEDIUM | Grav is vulnerable to a DOS on the admin panel |
| CVE-2025-66306 | 4.3 MEDIUM | Grav vulnerable to Information Disclosure via IDOR in Grav Admin Panel |
| CVE-2025-66301 | Grav ihas Broken Access Control which allows an Editor to modify the page's YAML Frontmatt | |
| CVE-2025-66310 | Grav vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/pages/[page]` parame | |
| CVE-2025-66298 | Grav is vulnerable to Server-Side Template Injection (SSTI) via Forms | |
| CVE-2025-66308 | Grav Admin Plugin vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/config/ | |
| CVE-2025-66309 | Grav vulnerable to Cross-Site Scripting (XSS) Reflected endpoint /admin/pages/[page], para | |
| CVE-2025-66311 | Grav vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/pages/[page]` in Mul | |
| CVE-2025-66297 | Grav vulnerable to Privilege Escalation and Authenticated Remote Code Execution via Twig I | |
| CVE-2025-66294 | Grav is vulnerable to RCE via SSTI through Twig Sandbox Bypass | |
| CVE-2025-66305 | Grav vulnerable to Denial of Service via Improper Input Handling in 'Supported' Parameter | |
| CVE-2025-66312 | Grav Admin Plugin vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/account |
No comments yet