CVE-2025-50286

A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.
References
Link Resource
https://github.com/binneko/CVE-2025-50286 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgrav:grav:1.7.48:*:*:*:*:*:*:*

History

07 Nov 2025, 19:18

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de ejecución remota de código (RCE) en Grav CMS v1.7.48 permite que un administrador autenticado cargue un complemento malicioso mediante la interfaz /admin/tools/direct-install. Una vez cargado, el complemento se extrae y carga automáticamente, lo que permite la ejecución arbitraria de código PHP y el acceso de shell inverso.
CPE cpe:2.3:a:getgrav:grav:1.7.48:*:*:*:*:*:*:*
First Time Getgrav grav
Getgrav
References () https://github.com/binneko/CVE-2025-50286 - () https://github.com/binneko/CVE-2025-50286 - Exploit, Third Party Advisory

07 Aug 2025, 05:15

Type Values Removed Values Added
References
  • {'url': 'http://grav.com', 'source': 'cve@mitre.org'}
  • {'url': 'https://github.com/binneko', 'source': 'cve@mitre.org'}

06 Aug 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-06 15:15

Updated : 2025-11-07 19:18


NVD link : CVE-2025-50286

Mitre link : CVE-2025-50286

CVE.ORG link : CVE-2025-50286


JSON object : View

Products Affected

getgrav

  • grav
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type