logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2024-27921

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2024-27921

Description:
Grav is an open-source, flat-file content management system. A file upload path traversal vulnerability has been identified in the application prior to version 1.7.45, enabling attackers to replace or create files with extensions like .json, .zip, .css, .gif, etc. This critical security flaw poses severe risks, that can allow attackers to inject arbitrary code on the server, undermine integrity of backup files by overwriting existing files or creating new ones, and exfiltrate sensitive data using CSS exfiltration techniques. Upgrading to patched version 1.7.45 can mitigate the issue.
Last updated date:
01/02/2025
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/02/2025
Reference url to background

https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy