Vulnerability Description
This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/pages/[page] endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[header][template] parameter. The script is saved within the page's frontmatter and executed automatically whenever the affected content is rendered in the administrative interface or frontend view. This vulnerability is fixed in 1.11.0-beta.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Getgrav | Grav-Plugin-Admin | <= 1.10.50 |
Related Weaknesses (CWE)
References
- https://github.com/getgrav/grav-plugin-admin/commit/99f653296504f1d6408510dd2f6fPatch
- https://github.com/getgrav/grav/security/advisories/GHSA-7g78-5g5g-mvfjExploitVendor Advisory
- https://github.com/getgrav/grav/security/advisories/GHSA-7g78-5g5g-mvfjExploitVendor Advisory
FAQ
What is CVE-2025-66310?
CVE-2025-66310 is a vulnerability with a CVSS score of 5.4 (MEDIUM). This admin plugin for Grav is an HTML user interface that provides a convenient way to configure Grav and easily create and modify pages. Prior to 1.11.0-beta.1, a Stored Cross-Site Scripting (XSS) vu...
How severe is CVE-2025-66310?
CVE-2025-66310 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66310?
Check the references section above for vendor advisories and patch information. Affected products include: Getgrav Grav-Plugin-Admin.