grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with access to any document on a Grist installation can use a feature for fetching from a URL that is executed on the server. The privileged network access of server-side requests could offer opportunities for attack escalation. This issue is fixed in version 1.7.7. The mitigation was to use the proxy for untrusted fetches intended for such purposes. As a workaround, avoid making http/https endpoints available to an instance running Grist that expose credentials or operate without credentials.
Metrics
Affected Vendors & Products
References
History
Wed, 26 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:getgrist:grist-core:*:*:*:*:*:*:*:* |
Fri, 14 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 14 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgrist
Getgrist grist-core |
|
| Vendors & Products |
Getgrist
Getgrist grist-core |
Thu, 13 Nov 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with access to any document on a Grist installation can use a feature for fetching from a URL that is executed on the server. The privileged network access of server-side requests could offer opportunities for attack escalation. This issue is fixed in version 1.7.7. The mitigation was to use the proxy for untrusted fetches intended for such purposes. As a workaround, avoid making http/https endpoints available to an instance running Grist that expose credentials or operate without credentials. | |
| Title | grist-core has path to server-side requests via websocket | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-11-13T21:43:57.610Z
Updated: 2025-11-14T17:10:33.307Z
Reserved: 2025-11-10T22:29:34.873Z
Link: CVE-2025-64752
Updated: 2025-11-14T17:06:57.857Z
Status : Analyzed
Published: 2025-11-13T22:15:52.563
Modified: 2025-11-26T16:19:34.703
Link: CVE-2025-64752
No data.