Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

getgrav

About This Vendor

getgrav is a technology vendor producing software and infrastructure products. As a software provider, getgrav's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of getgrav's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 63 known vulnerabilities from getgrav. This includes 6 critical-severity issues and 27 high-severity issues that represent significant risk. These vulnerabilities affect 5 distinct products across getgrav's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2018 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying getgrav products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-5233 2018-03-19 2024-11-21 6.1 4.3 Likely
CVE-2019-16126 2019-09-09 2024-11-21 6.1 4.3 Likely
CVE-2020-11529 2020-04-04 2024-11-21 6.1 5.8 Likely
CVE-2020-29555 2021-03-15 2024-11-21 8.1 5.5 Likely
CVE-2020-29556 2021-03-15 2024-11-21 5.5 2.1 Unknown
CVE-2020-29553 2021-03-15 2024-11-21 8.8 5.1 Unknown
CVE-2021-21425 2021-04-07 2024-11-21 9.3 7.5 Likely
CVE-2021-29439 2021-04-13 2024-11-21 7.2 6.5 Likely
CVE-2021-29440 2021-04-13 2024-11-21 8.4 6.5 Likely
CVE-2021-3799 2021-09-27 2024-11-21 5.4 5.8 Likely
CVE-2021-3818 2021-09-27 2024-11-21 5.3 5.0 Likely
CVE-2021-3904 2021-10-27 2024-11-21 5.4 3.5 Unknown
CVE-2021-3924 2021-11-05 2024-11-21 7.5 5.0 Likely
CVE-2021-3920 2021-11-19 2024-11-21 5.4 3.5 Unknown
CVE-2022-0268 2022-01-25 2024-11-21 5.4 3.5 Unknown
CVE-2022-0743 2022-02-28 2024-11-21 4.6 3.5 Unknown
CVE-2022-0970 2022-03-15 2024-11-21 5.4 3.5 Unknown
CVE-2022-1173 2022-04-26 2024-11-21 5.4 3.5 Unknown
CVE-2022-2073 2022-06-29 2024-11-21 7.2 6.5 Likely
CVE-2023-34251 2023-06-14 2024-11-21 9.9 - -
CVE-2023-34252 2023-06-14 2024-11-21 8.8 - -
CVE-2023-34253 2023-06-14 2024-11-21 8.8 - -
CVE-2023-34448 2023-06-14 2024-11-21 8.8 - -
CVE-2023-34452 2023-06-14 2024-11-21 5.4 - -
CVE-2023-37897 2023-07-18 2024-11-21 7.2 - -
CVE-2023-49146 2023-11-22 2024-11-21 6.1 - -
CVE-2023-31506 2024-02-09 2025-06-16 5.4 - -
CVE-2024-27923 2024-03-21 2025-01-02 8.8 - -
CVE-2024-27921 2024-03-21 2025-01-02 8.8 - -
CVE-2024-28116 2024-03-21 2025-01-02 8.8 - -
CVE-2024-28117 2024-03-21 2025-01-02 8.8 - -
CVE-2024-28118 2024-03-21 2025-01-02 8.8 - -
CVE-2024-28119 2024-03-21 2025-01-02 8.8 - -
CVE-2024-34082 2024-05-15 2025-01-02 8.5 - -
CVE-2024-35498 2025-01-06 2025-04-17 6.1 - -
CVE-2025-46199 2025-07-25 2025-08-15 9.8 - -
CVE-2025-46198 2025-07-25 2025-08-20 8.8 - -
CVE-2025-50286 2025-08-06 2025-11-07 8.1 - -
CVE-2025-63593 2025-11-03 2025-11-07 6.1 - -
CVE-2025-66294 2025-12-01 2025-12-04 8.8 - -
CVE-2025-66295 2025-12-01 2025-12-04 8.8 - -
CVE-2025-66296 2025-12-01 2025-12-04 8.8 - -
CVE-2025-66297 2025-12-01 2025-12-03 8.8 - -
CVE-2025-66298 2025-12-01 2025-12-03 7.5 - -
CVE-2025-66299 2025-12-01 2025-12-03 8.8 - -
CVE-2025-66300 2025-12-01 2025-12-03 8.5 - -
CVE-2025-66301 2025-12-01 2025-12-03 9.6 - -
CVE-2025-66302 2025-12-01 2025-12-03 6.8 - -
CVE-2025-66303 2025-12-01 2025-12-03 4.9 - -
CVE-2025-66304 2025-12-01 2025-12-03 6.2 - -
CVE-2025-66305 2025-12-01 2025-12-03 4.9 - -
CVE-2025-66306 2025-12-01 2025-12-03 4.3 - -
CVE-2025-66307 2025-12-01 2025-12-03 6.5 - -
CVE-2025-66308 2025-12-01 2025-12-03 5.4 - -
CVE-2025-66309 2025-12-01 2025-12-03 6.1 - -
CVE-2025-66310 2025-12-01 2025-12-03 5.4 - -
CVE-2025-66311 2025-12-01 2025-12-03 5.4 - -
CVE-2025-66312 2025-12-01 2025-12-03 5.4 - -
CVE-2025-65186 2025-12-02 2025-12-03 6.1 - -
CVE-2025-66843 2025-12-15 2025-12-17 5.4 - -
CVE-2025-66844 2025-12-15 2025-12-17 9.1 - -
CVE-2021-47812 2026-01-16 2026-02-02 9.8 - -
CVE-2026-29924 2026-03-30 2026-04-06 7.6 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for getgrav by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with getgrav's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.