CVSS 3.1 Score 8.8 of 10 (high)


Published Jul 18, 2023
Updated: Jul 28, 2023
CWE ID 393


CVE-2023-37897 is a server-side template injection (SSTI) vulnerability in Grav, a file-based web platform built in PHP. This vulnerability affects Grav versions 1.7.42 and onwards. The issue arises due to an incorrect return value from the `isDangerousFunction()` check, allowing attackers to execute malicious code by prepending a double backslash. To exploit this vulnerability, the attacker needs access to either an Administrator account or a non-administrator user account with Admin panel access and Create/Update page permissions. A fix has been introduced in commit `b4c6210` and is included in release version ``. It is recommended for users to upgrade as there are no known workarounds available. The vulnerability has a base severity score of 8.8 (High) according to NIST's CVSS v3.1 rating, with high impact on confidentiality, integrity, and availability of affected systems.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-37897 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options