CVE-2020-28124
Description
Cross Site Scripting (XSS) in LavaLite 5.8.0 via the Address field.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
LavaLite CMS 5.8.0 suffers from a stored XSS in the Address field, enabling privilege escalation from client to admin via stolen cookies.
Vulnerability
A stored Cross-Site Scripting (XSS) vulnerability exists in LavaLite CMS version 5.8.0 (and possibly all versions) [1][3]. The bug resides in the user profile's Address field, which does not properly sanitize input before storage and rendering [3]. An attacker with a client account can inject arbitrary JavaScript into their address when updating their profile.
Exploitation
Exploitation requires a client-level account on the LavaLite CMS [3]. The attacker logs in as a client, navigates to the settings page, and updates the Address field with a crafted XSS payload (e.g., ">) [3]. After saving, any administrator who visits the user list endpoint (/admin/user/client) will trigger the injected script in their browser [3]. No additional authentication or privileges on the attacker's part are required beyond the client account.
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of an administrator's session [3]. This can lead to theft of admin cookies, account takeover, and privilege escalation from a client account to admin level [3]. The XSS is stored and persistent, affecting any admin viewing the client list.
Mitigation
The vulnerability has been fixed by implementing input sanitization middleware that strips HTML from form inputs [3][4]. The fix was submitted via Pull Request #339 [3] and committed in commit fe5e71c [4] to the LavaLite CMS repository. Administrators should update to a version containing this patch; if not possible, ensure that no untrusted users can modify their profiles or restrict admin access to user lists. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lavalite/cmsPackagist | < 7.0.1 | 7.0.1 |
Affected products
2- LavaLite/LavaLitedescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-6r6h-vhg7-53x7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-28124ghsaADVISORY
- github.com/418sec/cms/pull/1ghsaWEB
- github.com/418sec/huntr/tree/staging/bounties/packagist/lavalite/cms/3mitrex_refsource_MISC
- github.com/LavaLite/cms/pull/339ghsaWEB
- github.com/LavaLite/cms/pull/339/commits/fe5e71c34d37a601e6208f671e34f04b56e3a02dghsaWEB
News mentions
0No linked articles in our index yet.