Incomplete List of Disallowed Inputs Affecting getgrav/grav package, versions <1.74.2


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
0.82% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-GETGRAVGRAV-5710385
  • published15 Jun 2023
  • disclosed15 Jun 2023
  • creditNgo Wei Lin, Wang Hengyue

Introduced: 15 Jun 2023

CVE-2023-34252  (opens in a new tab)
CWE-184  (opens in a new tab)

How to fix?

Upgrade getgrav/grav to version 1.74.2 or higher.

Overview

getgrav/grav is a Modern, Crazy Fast, Ridiculously Easy and Amazingly Powerful Flat-File CMS.

Affected versions of this package are vulnerable to Incomplete List of Disallowed Inputs. There is a logic flaw in the GravExtension.filterFilter() function whereby validation against a denylist of unsafe functions is only performed when the argument passed to filter is a string. However, passing an array as a callable argument allows the validation check to be skipped. Consequently, a low privileged attacker with login access to Grav Admin panel and page creation/update permissions is able to inject malicious templates to obtain remote code execution.

CVSS Scores

version 3.1