CVE-2024-31828: Lavalite CMS Cross Site Scripting vulnerability
Basic Information
Basic Information
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability manifests through URL-based XSS payloads affecting documentation routes (/docs/master/...). This suggests:
Route handlers (like PublicController) process URL segments without validation
Blade templates output these parameters without HTML escaping (using {!! !!} instead of {{ }})
The specific reproduction path suggests documentation rendering components are vulnerable
While exact code isn't available, Laravel CMS patterns and the attack vector indicate controller/view handling of URL parameters as the likely source.