CVE-2023-34448
PHP vulnerability analysis and mitigation

Overview

CVE-2023-34448 affects Grav, a flat-file content management system. Prior to version 1.7.42, the system contained a server-side template injection (SSTI) vulnerability that allowed for remote code execution. The vulnerability was a bypass of an earlier patch for CVE-2022-2073, where the fix for the default filter() function did not block other built-in functions exposed by Twig's Core Extension that could be used to invoke arbitrary unsafe functions (GitHub Advisory).

Technical details

The vulnerability exists in the Twig template engine implementation within Grav CMS. The original patch for CVE-2022-2073 only protected against the filter() function, but left map() and reduce() filter functions exposed, which could still be used to execute arbitrary commands. The vulnerability has a CVSS v3.1 base score of 7.2 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (GitHub Advisory).

Impact

Successful exploitation of this vulnerability allows authenticated attackers with access to the Grav Admin panel and page creation/update permissions to achieve remote code execution. This could lead to complete system compromise, allowing attackers to execute arbitrary commands within the context of the web application (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 1.7.42 by overriding the built-in Twig map() and reduce() filter functions in system/src/Grav/Common/Twig/Extension/GravExtension.php to validate the argument passed to the filter in $arrow. Users should upgrade to this version or later to protect against this vulnerability (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21857HIGH8.3
  • PHPPHP
  • redaxo/source
NoYesJan 07, 2026
CVE-2025-61676MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2025-61674MEDIUM6.1
  • PHPPHP
  • october/system
NoYesJan 10, 2026
CVE-2026-21896MEDIUM5.8
  • PHPPHP
  • getkirby/cms
NoYesJan 08, 2026
CVE-2026-22242MEDIUM4.9
  • PHPPHP
  • coreshop/core-shop
NoYesJan 08, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management