Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-7g78-5g5g-mvfj: Grav vulnerable to Cross-Site Scripting (XSS) Stored endpoint `/admin/pages/[page]` parameter `data[header][template]` in Advanced Tab

Summary

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/pages/[page] endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[header][template] parameter. The script is saved within the page’s frontmatter and executed automatically whenever the affected content is rendered in the administrative interface or frontend view.


Details

Vulnerable Endpoint: POST /admin/pages/[page]
Parameter: data[header][template]

The application fails to properly sanitize user input in the data[header][template] field, which is stored in the YAML frontmatter of the page. An attacker can inject JavaScript code using this field, and the payload is rendered and executed when the page is accessed, especially within the Admin Panel interface.


PoC

Payload:

<script>alert('PoC-XXS73')</script>

Steps to Reproduce:

  1. Log in to the Grav Admin Panel and navigate to Pages.

  2. Create a new page or edit an existing one.

  3. In the Advanced > Template field (which maps to data[header][template]), insert the payload: image

  4. Save the page.

  5. Return to the Pages section and click on the three-dot menu of the affected page: image

  6. The stored XSS payload is triggered, and the script is executed in the browser: image


Impact

Stored XSS vulnerabilities can have serious consequences, including:

  • Session hijacking: Capturing admin session cookies or tokens

  • Malware delivery: Executing scripts that load malicious resources

  • Credential theft: Creating fake login prompts to steal usernames/passwords

  • Data exposure: Reading sensitive metadata or page contents

  • Privilege escalation: Performing actions as an authenticated user

  • Website defacement: Altering visual or functional elements of the site

  • Reputation damage: Undermining user trust in the application

by CVE-Hunters

ghsa
#xss#vulnerability#web#git#java#perl#auth

Summary

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/pages/[page] endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[header][template] parameter. The script is saved within the page’s frontmatter and executed automatically whenever the affected content is rendered in the administrative interface or frontend view.

Details

Vulnerable Endpoint: POST /admin/pages/[page]
Parameter: data[header][template]

The application fails to properly sanitize user input in the data[header][template] field, which is stored in the YAML frontmatter of the page. An attacker can inject JavaScript code using this field, and the payload is rendered and executed when the page is accessed, especially within the Admin Panel interface.

PoC

Payload:

<script>alert(‘PoC-XXS73’)</script>

Steps to Reproduce:

  1. Log in to the Grav Admin Panel and navigate to Pages.

  2. Create a new page or edit an existing one.

  3. In the Advanced > Template field (which maps to data[header][template]), insert the payload:

  4. Save the page.

  5. Return to the Pages section and click on the three-dot menu of the affected page:

  6. The stored XSS payload is triggered, and the script is executed in the browser:

Impact

Stored XSS vulnerabilities can have serious consequences, including:

  • Session hijacking: Capturing admin session cookies or tokens

  • Malware delivery: Executing scripts that load malicious resources

  • Credential theft: Creating fake login prompts to steal usernames/passwords

  • Data exposure: Reading sensitive metadata or page contents

  • Privilege escalation: Performing actions as an authenticated user

  • Website defacement: Altering visual or functional elements of the site

  • Reputation damage: Undermining user trust in the application

by CVE-Hunters

References

  • GHSA-7g78-5g5g-mvfj
  • https://nvd.nist.gov/vuln/detail/CVE-2025-66310
  • getgrav/grav-plugin-admin@99f6532

ghsa: Latest News

GHSA-4fh9-h7wg-q85m: mdast-util-to-hast has unsanitized class attribute