GHSA-j7rw-325j-2rmx: Duplicate Advisory: Grav has Insecure Deserialization in File Cache
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-gwfr-jfjf-92vv. This link is maintained to preserve external references.
Original Description
A vulnerability was found in Grav CMS up to 1.7.49.5/2.0.0-beta.1. Affected by this vulnerability is the function FileCache::doGet of the file system/src/Grav/Framework/Cache/Adapter/FileCache.php of the component Cache Value Handler. The manipulation results in deserialization. The attack may be launched remotely. The attack requires a high level of complexity. The exploitation appears to be difficult. The exploit has been made public and could be used. Upgrading to version 2.0.0-beta.2 addresses this issue. The patch is identified as c66dfeb5f. The affected component should be upgraded.
References
- github.com/advisories/GHSA-j7rw-325j-2rmx
- github.com/devsamuelsantiago/grav-cms-filecache-object-injection
- github.com/getgrav/grav/commit/c66dfeb5f
- github.com/getgrav/grav/security/advisories/GHSA-gwfr-jfjf-92vv
- nvd.nist.gov/vuln/detail/CVE-2026-7317
- vuldb.com/submit/798732
- vuldb.com/vuln/359965
- vuldb.com/vuln/359965/cti
Code Behaviors & Features
Detect and mitigate GHSA-j7rw-325j-2rmx with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →