Duplicate Advisory: Grav has Insecure Deserialization in File Cache
Low severity
GitHub Reviewed
Published
Apr 29, 2026
to the GitHub Advisory Database
•
Updated May 6, 2026
Withdrawn
This advisory was withdrawn on May 6, 2026
Description
Published by the National Vulnerability Database
Apr 28, 2026
Published to the GitHub Advisory Database
Apr 29, 2026
Reviewed
May 6, 2026
Withdrawn
May 6, 2026
Last updated
May 6, 2026
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-gwfr-jfjf-92vv. This link is maintained to preserve external references.
Original Description
A vulnerability was found in Grav CMS up to 1.7.49.5/2.0.0-beta.1. Affected by this vulnerability is the function FileCache::doGet of the file system/src/Grav/Framework/Cache/Adapter/FileCache.php of the component Cache Value Handler. The manipulation results in deserialization. The attack may be launched remotely. The attack requires a high level of complexity. The exploitation appears to be difficult. The exploit has been made public and could be used. Upgrading to version 2.0.0-beta.2 addresses this issue. The patch is identified as c66dfeb5f. The affected component should be upgraded.
References