CVE-2026-7317 PUBLISHED

Grav CMS Cache Value FileCache.php doGet deserialization

Assigner: VulDB
Reserved: 28.04.2026 Published: 28.04.2026 Updated: 28.04.2026

A vulnerability was found in Grav CMS up to 1.7.49.5/2.0.0-beta.1. Affected by this vulnerability is the function FileCache::doGet of the file system/src/Grav/Framework/Cache/Adapter/FileCache.php of the component Cache Value Handler. The manipulation results in deserialization. The attack may be launched remotely. The attack requires a high level of complexity. The exploitation appears to be difficult. The exploit has been made public and could be used. Upgrading to version 2.0.0-beta.2 addresses this issue. The patch is identified as c66dfeb5f. The affected component should be upgraded.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 2.3

Product Status

Vendor Grav
Product CMS
Versions
  • Version 1.7.49.0 is affected
  • Version 1.7.49.1 is affected
  • Version 1.7.49.2 is affected
  • Version 1.7.49.3 is affected
  • Version 1.7.49.4 is affected
  • Version 1.7.49.5 is affected
  • Version 2.0.0-beta.0 is affected
  • Version 2.0.0-beta.1 is affected
  • Version 2.0.0-beta.2 is unaffected

Credits

  • s4nnty (VulDB User) reporter

References

Problem Types

  • Deserialization CWE
  • Improper Input Validation CWE