578
VMScore

CVE-2021-29440

Published: 13/04/2021 Updated: 09/11/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Grav is a file based Web-platform. Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. The issue was addressed in version 1.7.11.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

getgrav grav

Exploits

Grav CMS version 1710 suffers from a server-side template injection vulnerability ...

Github Repositories

Unsafe Twig processing of static pages leading to RCE in Grav CMS 1.7.10

CVE-2021-29440 Unsafe Twig processing of static pages leading to RCE in Grav CMS 1710 Grav is a file based Web-platform Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the