A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/binneko/CVE-2025-50286 |
![]() ![]() |
History
Thu, 07 Aug 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 06 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-434 | |
Metrics |
cvssV3_1
|
Wed, 06 Aug 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-06T00:00:00.000Z
Updated: 2025-08-07T04:20:30.841Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-50286

Updated: 2025-08-06T14:56:13.692Z

Status : Awaiting Analysis
Published: 2025-08-06T15:15:32.297
Modified: 2025-08-07T05:15:46.387
Link: CVE-2025-50286

No data.