Miggo Logo

CVE-2020-23700: Cross-site scripting in LavaLite-CMS

4.8

CVSS Score
3.1

Basic Information

EPSS Score
0.46406%
Published
9/8/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
lavalite/cmscomposer<= 5.8.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key points: 1) Lack of input sanitization when saving menu link names (handled by the controller's postEdit method), and 2) Lack of output encoding when rendering menu items (handled by the Blade template). The reproduction steps explicitly involve editing menu links and observing XSS during rendering, implicating these components. While exact code isn't available, Lavalite's Laravel architecture and standard XSS patterns strongly support this analysis.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross Sit* S*riptin* (XSS) vuln*r**ility in L*v*Lit*-*MS *.*.* vi* t** M*nu Links ***tur*.

Reasoning

T** vuln*r**ility st*ms *rom two k*y points: *) L**k o* input s*nitiz*tion w**n s*vin* m*nu link n*m*s (**n*l** *y t** *ontroll*r's `post**it` m*t*o*), *n* *) L**k o* output *n*o*in* w**n r*n**rin* m*nu it*ms (**n*l** *y t** `*l***` t*mpl*t*). T** r*