CVE-2020-36395: Stored XSS in LavaLite 5.8.0
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.42411%
CWE
Published
5/24/2022
Updated
7/6/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| lavalite/cms | composer | < 5.8.0 | 5.8.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves two key phases: 1) Unsanitized input handling in the storage process, and 2) Unencoded output in rendering. Based on Laravel MVC patterns and the described /admin/user/team endpoint:
- TeamController@store would handle form submissions containing the 'New' parameter
- TeamController@show would display stored team data While specific code isn't available, the GitHub issue confirms insufficient input filtering and output encoding. These controller methods are the most likely candidates for user input handling and rendering based on standard Laravel CMS architecture.