Featured image of post CVE-2025-66312

CVE-2025-66312

Cross-Site Scripting (XSS) Stored

CVE-2025-66312: Cross-Site Scripting (XSS) Stored endpoint /admin/accounts/groups/[group] parameter data[readableName]

CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-66312

Summary

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/accounts/groups/Grupo endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[readableName] parameter. The injected scripts are stored on the server and executed automatically whenever the affected page is accessed by users, posing a significant security risk.

Details

Vulnerable Endpoint: POST /admin/accounts/groups/Grupo

Parameter: data[readableName]

PoC

Payload

1
<ScRipT>alert('PoC-XSS')</ScRipT>

Steps to Reproduce:

  • Navigate to Accounts > Groups in the administrative panel.
  • Create a new group or edit an existing one.
  • In the Display Name field (which maps to data[readableName]), insert the payload above and save the changes.

  • The following HTTP request was generated during this action:

  • Next, go to Accounts > Users and open any user profile.

  • The malicious script is executed immediately in the browser when the page loads, confirming the existence of a Stored XSS vulnerability.

Impact

  • Session hijacking: Stealing cookies or authentication tokens to impersonate users.
  • Credential theft: Harvesting usernames and passwords using malicious scripts.
  • Malware delivery: Distributing unwanted or harmful code to victims.
  • Privilege escalation: Compromising administrative users through persistent scripts.
  • Data manipulation or defacement: Changing or disrupting site content.
  • Reputation damage: Eroding trust among site users and administrators.

Reference

https://github.com/getgrav/grav/security/advisories/GHSA-rmw5-f87r-w988

Finder

Marcelo Queiroz

By: CVE-Hunters

Built with Hugo
Theme Stack designed by Jimmy