The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-66304

CVE-2025-66304: Getgrav Grav Information Disclosure Flaw

CVE-2025-66304 is an information disclosure vulnerability in Getgrav Grav that exposes password hashes to users with read access. This article covers the technical details, affected versions, impact, and mitigation.

Updated: May 15, 2026

CVE-2025-66304 Overview

CVE-2025-66304 affects Grav, a file-based web platform widely used for content management. The vulnerability exposes password hashes of all users, including the administrator account, to any authenticated user who holds read access to the user account management section of the admin panel. Attackers who obtain these hashes can attempt offline cracking and escalate privileges if weak passwords are in use. The flaw is classified as Information Exposure [CWE-200] and is fixed in Grav 1.8.0-beta.27.

Critical Impact

Low-privileged admin users can retrieve administrator password hashes, enabling offline cracking and full account takeover.

Affected Products

  • Getgrav Grav versions prior to 1.8.0-beta.27
  • All 1.8.0 beta releases from beta1 through beta26
  • Deployments exposing the admin panel to multiple user roles

Discovery Timeline

  • 2025-12-01 - CVE-2025-66304 published to NVD
  • 2025-12-03 - Last updated in NVD database

Technical Details for CVE-2025-66304

Vulnerability Analysis

Grav stores user credentials as hashed values within file-based user account records. The admin panel exposes these account records to users with read permissions on the user management section. The application fails to strip or redact the hashed_password field before serving account data to authorized viewers. As a result, any user able to view account entries retrieves the raw password hash alongside other account metadata.

This information exposure breaks the principle that password hashes must remain accessible only to authentication routines. Read access on user management should not equal read access on credentials. The vulnerability requires existing authentication, but lateral or vertical privilege escalation becomes feasible once an attacker holds any admin-tier read role.

Root Cause

The root cause is missing field-level access control on the user account API response. The admin controller serializes the entire user object, including the password hash attribute, without filtering sensitive fields based on the requesting user's privileges. The fix in commit 9d11094e4133f059688fad1e00dbe96fb6e3ead7 removes the hash field from responses returned to the admin UI.

Attack Vector

An attacker authenticates to the Grav admin panel using a low-privileged account that holds read access to user accounts. The attacker browses to the user management section and inspects either the rendered page source or the underlying JSON API response. The hash for each user, including the administrator, is returned in the response payload. The attacker then performs offline cracking using tools such as hashcat or john against the recovered hashes. Successful cracking yields administrator credentials and full control of the Grav installation.

No exploitation code is required beyond authenticated HTTP access. See the GitHub Security Advisory GHSA-gq3g-666w-7h85 for vendor analysis.

Detection Methods for CVE-2025-66304

Indicators of Compromise

  • Admin panel HTTP responses containing hashed_password fields in JSON bodies served to non-administrative roles
  • Unexpected authenticated requests to user account management endpoints from accounts that do not routinely manage users
  • Successful admin logins from IP addresses or user agents not previously associated with administrator accounts

Detection Strategies

  • Inspect web server access logs for repeated GETs against admin user management routes by low-privileged sessions
  • Review Grav admin audit trails for account enumeration patterns followed by privileged login attempts
  • Monitor for offline cracking indicators such as sudden password rotations or anomalous authentication bursts on the administrator account

Monitoring Recommendations

  • Enable verbose logging on the Grav admin panel and forward logs to a centralized analytics platform
  • Alert on any HTTP response from admin endpoints whose body matches password hash signatures ($2y$, $2b$, $argon2)
  • Track changes to user account files on disk under the Grav user/accounts/ directory

How to Mitigate CVE-2025-66304

Immediate Actions Required

  • Upgrade Grav to version 1.8.0-beta.27 or later without delay
  • Force password resets for all accounts, prioritizing administrator and privileged roles
  • Audit existing admin panel user roles and remove read access to user management for accounts that do not require it
  • Review recent admin panel access logs for evidence of unauthorized hash retrieval

Patch Information

The vulnerability is fixed in Grav 1.8.0-beta.27. The corrective change is published in commit 9d11094e4133f059688fad1e00dbe96fb6e3ead7 and detailed in the Grav Security Advisory GHSA-gq3g-666w-7h85. Apply the upstream release through the Grav package manager or by replacing the affected files from the official distribution.

Workarounds

  • Restrict admin panel access to trusted networks using firewall rules or reverse proxy ACLs until patching is complete
  • Limit the number of accounts with admin panel read permissions to the minimum required
  • Enforce strong password policies and multi-factor authentication to reduce the value of any cracked hash
bash
# Upgrade Grav using the bundled CLI
bin/gpm selfupgrade -f
bin/gpm update

# Verify the installed version meets or exceeds the patched release
bin/grav --version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechGetgrav

  • SeverityHIGH

  • CVSS Score7.2

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-200
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Security Advisory GHSA-gq3g-666w-7h85
  • Related CVEs
  • CVE-2026-44738: Getgrav Grav Information Disclosure Flaw

  • CVE-2025-66300: Grav CMS Information Disclosure Flaw

  • CVE-2026-42609: Getgrav Grav Privilege Escalation Flaw

  • CVE-2026-42610: Getgrav Grav Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English