
CVE-2024-28116
- Reference to the description:
- Description:
- Grav is an open-source, flat-file content management system. Grav CMS prior to version 1.7.45 is vulnerable to a Server-Side Template Injection (SSTI), which allows any authenticated user (editor permissions are sufficient) to execute arbitrary code on the remote server bypassing the existing security sandbox. Version 1.7.45 contains a patch for this issue.
- Last updated date:
- 01/02/2025
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 03/24/2024
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/05/2024
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/05/2024
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 01/02/2025
- Reference url to background
https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh