CVE-2024-27923

Grav is a content management system (CMS). Prior to version 1.7.43, users who may write a page may use the `frontmatter` feature due to insufficient permission validation and inadequate file name validation. This may lead to remote code execution. Version 1.7.43 fixes this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*

History

02 Jan 2025, 23:02

Type Values Removed Values Added
References () https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v - () https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v - Exploit, Vendor Advisory
References () https://github.com/getgrav/grav/commit/e3b0aa0c502aad251c1b79d1ee973dcd93711f07 - () https://github.com/getgrav/grav/commit/e3b0aa0c502aad251c1b79d1ee973dcd93711f07 - Patch
CWE CWE-434
First Time Getgrav
Getgrav grav
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*

21 Mar 2024, 02:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-21 02:52

Updated : 2025-01-02 23:02


NVD link : CVE-2024-27923

Mitre link : CVE-2024-27923


JSON object : View

Products Affected

getgrav

  • grav
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type