The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-66307

CVE-2025-66307: Grav Admin Plugin Info Disclosure Flaw

CVE-2025-66307 is an information disclosure vulnerability in Grav Admin Plugin that exposes usernames and email addresses through the forgot password feature. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-66307 Overview

A user enumeration and email disclosure vulnerability exists in the Grav CMS admin plugin prior to version 1.11.0-beta.1. The "Forgot Password" functionality at the /admin/forgot endpoint leaks information about valid usernames and their associated email addresses through distinct server responses. This information disclosure vulnerability allows attackers to enumerate users and disclose sensitive email addresses, which can be leveraged for targeted attacks such as password spraying, phishing, or social engineering campaigns.

Critical Impact

Attackers can enumerate valid usernames and email addresses through the password reset functionality, enabling targeted credential attacks, phishing campaigns, and social engineering against confirmed user accounts.

Affected Products

  • Grav Admin Plugin (grav-plugin-admin) versions prior to 1.11.0-beta.1

Discovery Timeline

  • 2025-12-01 - CVE-2025-66307 published to NVD
  • 2025-12-03 - Last updated in NVD database

Technical Details for CVE-2025-66307

Vulnerability Analysis

This vulnerability is classified under CWE-204 (Observable Response Discrepancy), where the application's different error messages for valid versus invalid usernames create an observable pattern that attackers can exploit. With a CVSS 3.1 score of 5.3 (Medium severity) and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, the vulnerability is network-exploitable without authentication or user interaction.

The Exploit Prediction Scoring System (EPSS) assigns this vulnerability a probability of 0.036% with a percentile ranking of 10.27, indicating a relatively low likelihood of exploitation in the wild. However, user enumeration vulnerabilities are commonly targeted as preliminary reconnaissance steps in broader attack campaigns.

Root Cause

The root cause lies in the password reset functionality's error handling mechanism in the LoginController.php file. When a user requests a password reset, the application returned different error messages based on whether the submitted username or email existed in the system. The original code exposed the actual email address in rate-limiting error messages, directly confirming both user existence and their associated email.

Attack Vector

The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) and no user interaction (UI:N). An attacker can systematically submit password reset requests to the /admin/forgot endpoint with various usernames or email addresses, analyzing the server responses to identify valid accounts. The distinct response patterns—including error messages that revealed email addresses during rate limiting—allowed attackers to build a list of valid users and their email addresses for subsequent attacks.

The following patch demonstrates the fix implemented to address the user enumeration issue:

php
 
            $interval = $config->get('plugins.login.max_pw_resets_interval', 2);
 
-            $this->setMessage($this->translate('PLUGIN_LOGIN.FORGOT_CANNOT_RESET_IT_IS_BLOCKED', $to, $interval), 'error');
+            // Security: Use generic message to prevent email enumeration (GHSA-q3qx-cp62-f6m7)
+            $this->setMessage($this->translate('PLUGIN_ADMIN.FORGOT_CANNOT_RESET_RATE_LIMITED', $interval), 'error');
 
            return $this->createRedirectResponse($current);
        }

Source: https://github.com/getgrav/grav-plugin-admin/commit/99f653296504f1d6408510dd2f6f20a45a26f9b0

The patch replaces the verbose error message that included the user's email address ($to) with a generic rate-limited message that only displays the time interval, preventing email enumeration.

Detection Methods for CVE-2025-66307

Indicators of Compromise

  • Unusual volume of requests to the /admin/forgot password reset endpoint
  • Multiple password reset attempts from single IP addresses with varying usernames
  • Sequential or automated patterns in username submissions to the forgot password form
  • Failed authentication attempts following password reset enumeration activity

Detection Strategies

Organizations should implement web application firewall (WAF) rules to detect and block automated enumeration attempts against the password reset endpoint. Log analysis should focus on identifying patterns of repeated requests to /admin/forgot with varying input values from single source IPs. Implementing CAPTCHA or progressive delays after multiple failed attempts can help detect and mitigate automated enumeration.

Monitor for requests that trigger rate-limiting responses, as attackers may use rate-limiting behavior as a signal to confirm valid accounts. Security teams should analyze HTTP response sizes and timing patterns, as user enumeration vulnerabilities often manifest as subtle differences in response characteristics.

Monitoring Recommendations

Configure web server access logs to capture full request details for the admin panel endpoints. Set up alerting thresholds for password reset request volumes that exceed normal baselines. Implement real-time monitoring of authentication-related endpoints with anomaly detection capabilities. Consider deploying honeypot usernames to detect enumeration attempts and track attacker methodologies.

How to Mitigate CVE-2025-66307

Immediate Actions Required

  • Upgrade the Grav Admin Plugin to version 1.11.0-beta.1 or later immediately
  • Review access logs for evidence of prior enumeration attempts against the /admin/forgot endpoint
  • Implement rate limiting and CAPTCHA on the password reset functionality if not already present
  • Consider implementing IP-based blocking for excessive password reset requests

Patch Information

The vulnerability is fixed in Grav Admin Plugin version 1.11.0-beta.1. The security patch is available via the official GitHub repository commit 99f653296504f1d6408510dd2f6f20a45a26f9b0. Organizations should update through their standard Grav update mechanisms or by manually applying the patch from the official repository.

Additional security advisories and details are available at:

  • Security Advisory: https://github.com/getgrav/grav/security/advisories/GHSA-q3qx-cp62-f6m7
  • Patch Commit: https://github.com/getgrav/grav-plugin-admin/commit/99f653296504f1d6408510dd2f6f20a45a26f9b0

Workarounds

If immediate patching is not possible, organizations can implement the following temporary mitigations:

bash
# Apache .htaccess rate limiting for /admin/forgot endpoint
# Add to your .htaccess file in the Grav root directory

<IfModule mod_rewrite.c>
    RewriteEngine On
    # Limit requests to admin/forgot endpoint
    RewriteCond %{REQUEST_URI} ^/admin/forgot [NC]
    RewriteCond %{HTTP_COOKIE} !rate_limit_token
    RewriteRule .* - [E=RATE_CHECK:1]
</IfModule>

# Alternative: Use fail2ban to monitor and block excessive requests
# /etc/fail2ban/filter.d/grav-admin.conf
[Definition]
failregex = ^<HOST> .* "POST /admin/forgot.*"

Consider placing the Grav admin panel behind additional authentication layers (such as HTTP Basic Auth or VPN access) to reduce exposure. Network-level controls such as restricting admin panel access to trusted IP ranges can provide defense-in-depth while awaiting the patch deployment.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechGrav

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-204
  • Vendor Resources
  • Patch

  • Exploit, Vendor Advisory

  • Exploit, Vendor Advisory
  • Related CVEs
  • CVE-2025-66309: Grav-plugin-admin XSS Vulnerability

  • CVE-2025-66310: Grav Admin Plugin Stored XSS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English