grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with access to any document on a Grist installation can use a feature for fetching from a URL that is executed on the server. The privileged network access of server-side requests could offer opportunities for attack escalation. This issue is fixed in version 1.7.7. The mitigation was to use the proxy for untrusted fetches intended for such purposes. As a workaround, avoid making http/https endpoints available to an instance running Grist that expose credentials or operate without credentials.
History

Wed, 26 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:getgrist:grist-core:*:*:*:*:*:*:*:*

Fri, 14 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Getgrist
Getgrist grist-core
Vendors & Products Getgrist
Getgrist grist-core

Thu, 13 Nov 2025 22:00:00 +0000

Type Values Removed Values Added
Description grist-core is a spreadsheet hosting server. Prior to version 1.7.7, a user with access to any document on a Grist installation can use a feature for fetching from a URL that is executed on the server. The privileged network access of server-side requests could offer opportunities for attack escalation. This issue is fixed in version 1.7.7. The mitigation was to use the proxy for untrusted fetches intended for such purposes. As a workaround, avoid making http/https endpoints available to an instance running Grist that expose credentials or operate without credentials.
Title grist-core has path to server-side requests via websocket
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-13T21:43:57.610Z

Updated: 2025-11-14T17:10:33.307Z

Reserved: 2025-11-10T22:29:34.873Z

Link: CVE-2025-64752

cve-icon Vulnrichment

Updated: 2025-11-14T17:06:57.857Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-13T22:15:52.563

Modified: 2025-11-26T16:19:34.703

Link: CVE-2025-64752

cve-icon Redhat

No data.