Vulnerabilities > CVE-2023-34251 - Unspecified vulnerability in Getgrav Grav
Attack vector
NETWORK Attack complexity
LOW Privileges required
HIGH Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Grav is a flat-file content management system. Versions prior to 1.7.42 are vulnerable to server side template injection. Remote code execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges. Version 1.7.42 contains a fix for this issue.
Vulnerable Configurations
References
- https://github.com/getgrav/grav/blob/develop/system/src/Grav/Common/Twig/Extension/GravExtension.php#L174
- https://github.com/getgrav/grav/commit/9d01140a63c77075ef09b26ef57cf186138151a5
- https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5
- https://github.com/getgrav/grav/blob/develop/system/src/Grav/Common/Twig/Extension/GravExtension.php#L174
- https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5
- https://github.com/getgrav/grav/commit/9d01140a63c77075ef09b26ef57cf186138151a5