CVE-2024-28116

Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*

History

02 Jan 2025, 22:57

Type Values Removed Values Added
References () https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e - () https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e - Patch
References () https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh - () https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh - Exploit, Vendor Advisory
CPE cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*
First Time Getgrav
Getgrav grav

Information

Published : 2024-03-21 22:15

Updated : 2025-01-02 22:57


NVD link : CVE-2024-28116

Mitre link : CVE-2024-28116

CVE.ORG link : CVE-2024-28116


JSON object : View

Products Affected

getgrav

  • grav
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-1336

Improper Neutralization of Special Elements Used in a Template Engine