Server side cross-site scripting In getgrav/grav

Description

Grav: Stored XSS via page title (data[header][title]) in admin panel

Summary

A Stored Cross-Site Scripting (XSS) vulnerability was identified in the /admin/pages/[page] endpoint of the Grav application. This vulnerability allows attackers to inject malicious scripts into the data[header][title] parameter.


Details

Vulnerable Endpoint: GET /admin/pages/[page] Parameter: data[header][title]

The application fails to properly validate and sanitize user input in the data[header][title] parameter. As a result, attackers can craft a malicious URL with an XSS payload. When this URL is accessed, the injected script is reflected back in the HTTP response and executed within the context of the victim's browser session.


PoC

Payload: <img src=1 onerror=alert(1)>

    Log in to the Grav Admin Panel and navigate to Pages.

    Create a new page or edit an existing one.

    Edit title of the page to <img src=1 onerror=alert(1)>

image

    Save page

    Open the move function and click on the folder having the payload

image image

Impact

Stored cross-site scripting (XSS) attacks can have serious consequences, including:

    User actions: Attackers can perform actions on behalf of the user

    Data theft: Sensitive information such as session cookies can be stolen

    Account compromise: Attackers may impersonate legitimate users

    Malicious code execution: Arbitrary JavaScript code can run in the user’s browser

    Website defacement or misinformation: Malicious output may be injected visually

    User redirection: Victims may be redirected to phishing or malicious websites

By Vu Duc Hieu Contributor Simon Tran

Mitigation

Update Impact

Minimal update. May introduce new vulnerabilities or breaking changes.

Ecosystem
Package
Affected version
Patched versions