Skip to content

Commit 54159fc

Browse files
1 parent 5aa4b0f commit 54159fc

File tree

1 file changed

+26
-5
lines changed

1 file changed

+26
-5
lines changed

advisories/unreviewed/2025/12/GHSA-cchq-397m-q2qm/GHSA-cchq-397m-q2qm.json renamed to advisories/github-reviewed/2025/12/GHSA-cchq-397m-q2qm/GHSA-cchq-397m-q2qm.json

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,47 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cchq-397m-q2qm",
4-
"modified": "2025-12-02T21:31:28Z",
4+
"modified": "2025-12-03T14:18:29Z",
55
"published": "2025-12-02T18:30:36Z",
66
"aliases": [
77
"CVE-2025-65186"
88
],
9+
"summary": "Grav CMS is vulnerable to Cross Site Scripting (XSS) in the page editor",
910
"details": "Grav CMS 1.7.49 is vulnerable to Cross Site Scripting (XSS). The page editor allows authenticated users to edit page content via a Markdown editor. The editor fails to properly sanitize <script> tags, allowing stored XSS payloads to execute when pages are viewed in the admin interface.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "getgrav/grav"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "1.7.49"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
2041
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65186"
2142
},
2243
{
23-
"type": "WEB",
44+
"type": "PACKAGE",
2445
"url": "https://github.com/getgrav/grav"
2546
},
2647
{
@@ -33,8 +54,8 @@
3354
"CWE-79"
3455
],
3556
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2025-12-03T14:18:29Z",
3859
"nvd_published_at": "2025-12-02T17:16:06Z"
3960
}
4061
}

0 commit comments

Comments
 (0)