Miggo Logo

CVE-2024-31828:
Lavalite CMS Cross Site Scripting vulnerability

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.38076%
Published
4/27/2024
Updated
7/3/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
lavalite/cmscomposer= 10.1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests through URL-based XSS payloads affecting documentation routes (/docs/master/...). This suggests:

  1. Route handlers (like PublicController) process URL segments without validation
  2. Blade templates output these parameters without HTML escaping (using {!! !!} instead of {{ }})
  3. The specific reproduction path suggests documentation rendering components are vulnerable While exact code isn't available, Laravel CMS patterns and the attack vector indicate controller/view handling of URL parameters as the likely source.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross Sit* S*riptin* vuln*r**ility in L*v*lit* *MS v.**.*.* *llows *tt**k*rs to *x**ut* *r*itr*ry *o** *n* o*t*in s*nsitiv* in*orm*tion vi* * *r**t** p*ylo** to t** URL.

Reasoning

T** vuln*r**ility m*ni**sts t*rou** URL-**s** XSS p*ylo**s *****tin* *o*um*nt*tion rout*s (/*o*s/m*st*r/...). T*is su***sts: *. Rout* **n*l*rs (lik* Pu*li**ontroll*r) pro**ss URL s**m*nts wit*out v*li**tion *. *l*** t*mpl*t*s output t**s* p*r*m*t*rs