Vulnerability Description
Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. A user with the create user permission can create a new account using the same username as an existing administrator account, set a new password/email, and then log in as that administrator. This effectively allows privilege escalation from limited user-manager permissions to full administrator access. This vulnerability is fixed in 1.8.0-beta.27.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getgrav | Grav | >= 1.7.49.5, < 1.8.0 |
Related Weaknesses (CWE)
References
- https://github.com/getgrav/grav/commit/3462d94d575064601689b236508c316242e15741Patch
- https://github.com/getgrav/grav/security/advisories/GHSA-cjcp-qxvg-4rjmVendor Advisory
FAQ
What is CVE-2025-66296?
CVE-2025-66296 is a vulnerability with a CVSS score of 8.8 (HIGH). Grav is a file-based Web platform. Prior to 1.8.0-beta.27, a privilege escalation vulnerability exists in Grav’s Admin plugin due to the absence of username uniqueness validation when creating users. ...
How severe is CVE-2025-66296?
CVE-2025-66296 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66296?
Check the references section above for vendor advisories and patch information. Affected products include: Getgrav Grav.