Skip to content

Commit ba05941

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 6d4b268 commit ba05941

File tree

1 file changed

+60
-0
lines changed

1 file changed

+60
-0
lines changed

db/modules_metadata_base.json

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110387,6 +110387,66 @@
110387110387
"session_types": false,
110388110388
"needs_cleanup": null
110389110389
},
110390+
"exploit_multi/http/grav_admin_direct_install_rce_cve_2025_50286": {
110391+
"name": "Grav CMS Admin Direct Install Authenticated Plugin Upload RCE",
110392+
"fullname": "exploit/multi/http/grav_admin_direct_install_rce_cve_2025_50286",
110393+
"aliases": [],
110394+
"rank": 600,
110395+
"disclosure_date": "2025-08-07",
110396+
"type": "exploit",
110397+
"author": [
110398+
"binneko",
110399+
"x1o3"
110400+
],
110401+
"description": "Grav CMS version <=1.7.49.5 with Admin Plugin version <=1.10.49.3 is\n vulnerable to authenticated remote code execution via the\n \"Direct Install\" feature in the administrative interface.\n\n An authenticated administrator can upload a crafted plugin\n archive containing arbitrary PHP code. The uploaded plugin\n is written to disk and executed by the application, allowing\n command execution in the context of the web server user.\n\n This module authenticates to the admin panel, uploads a\n malicious plugin via /admin/tools/direct-install, and\n triggers execution of the embedded payload.",
110402+
"references": [
110403+
"CVE-2025-50286",
110404+
"EDB-52402",
110405+
"URL-https://github.com/getgrav/grav"
110406+
],
110407+
"platform": "PHP",
110408+
"arch": "php",
110409+
"rport": 80,
110410+
"autofilter_ports": [
110411+
80,
110412+
8080,
110413+
443,
110414+
8000,
110415+
8888,
110416+
8880,
110417+
8008,
110418+
3000,
110419+
8443
110420+
],
110421+
"autofilter_services": [
110422+
"http",
110423+
"https"
110424+
],
110425+
"targets": [
110426+
"PHP Payload"
110427+
],
110428+
"mod_time": "2026-03-27 11:45:20 +0000",
110429+
"path": "/modules/exploits/multi/http/grav_admin_direct_install_rce_cve_2025_50286.rb",
110430+
"is_install_path": true,
110431+
"ref_name": "multi/http/grav_admin_direct_install_rce_cve_2025_50286",
110432+
"check": true,
110433+
"post_auth": true,
110434+
"default_credential": false,
110435+
"notes": {
110436+
"Stability": [
110437+
"crash-safe"
110438+
],
110439+
"Reliability": [
110440+
"repeatable-session"
110441+
],
110442+
"SideEffects": [
110443+
"ioc-in-logs",
110444+
"artifacts-on-disk"
110445+
]
110446+
},
110447+
"session_types": false,
110448+
"needs_cleanup": null
110449+
},
110390110450
"exploit_multi/http/grav_twig_ssti_sandbox_bypass_rce": {
110391110451
"name": "Grav CMS Twig SSTI Authenticated Sandbox Bypass RCE",
110392110452
"fullname": "exploit/multi/http/grav_twig_ssti_sandbox_bypass_rce",

0 commit comments

Comments
 (0)