CVE-2025-66295 - Grav vulnerable to Path traversal / arbitrary YAML write via user creation leadi...

CVE-2025-66295 - Grav vulnerable to Path traversal / arbitrary YAML write via user creation leadi...

CVE ID : CVE-2025-66295 Published : Dec. 1, 2025, 9:15 p.m. | 39 minutes ago Description : Grav is a file-based Web platform. Prior to 1.8.0-beta.27, when a user with privilege of user creation creates a new user through the Admin UI and supplies a username containing path traversal sequences (for example ..\Nijat or ../Nijat), Grav writes the account YAML file to an unintended path outside user/accounts/. The written YAML can contain account fields such as email, fullname, twofa_secret, and hashed_password. This vulnerability is fixed in 1.8.0-beta.27. Severity: 8.8 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
Dec. 1, 2025
Impact: path traversal

Source: Telegram CVE Monitor