Grav CMS RCE Alert: Hackers Love Direct Install, You Won’t!

Grav CMS 1.7.48 is vulnerable to authenticated remote code execution. Thanks to the “Direct Install” feature, adventurous admins can transform their website into a high-tech puppet show, with PHP scripts pulling the strings. Just make sure your malicious plugin has a catchy name—evilplugin has a nice ring to it!

Pro Dashboard

Hot Take:

Grav CMS may have just dug its own grave with this RCE vulnerability. Who knew “Direct Install” could translate to “Directly Install Your Worst Nightmare”? I guess it’s time to grav-itate towards some serious patching!

Key Points:

  • Grav CMS version 1.7.48 with Admin Plugin 1.10.48 has an RCE vulnerability.
  • Authenticated admins can execute arbitrary PHP code via the “Direct Install” feature.
  • This issue is tracked as CVE-2025-50286.
  • The vulnerability arises from insufficient validation during plugin uploads.
  • Exploitation can lead to full system compromise.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?