CVE-2023-27237
Description
LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
LavaLite CMS v9.0.0 is vulnerable to a host header injection attack, allowing an attacker to manipulate the application's behavior by controlling the Host HTTP header.
LavaLite CMS version 9.0.0 is susceptible to a host header injection vulnerability. The application fails to properly validate or sanitize the Host HTTP header, allowing an attacker to supply an arbitrary host value in incoming requests. This type of flaw typically arises when the application uses the Host header to generate URLs, reset password links, or other security-sensitive functions, without verifying that the header matches a known server configuration [1][2].
An attacker can exploit this vulnerability by sending a crafted HTTP request to a LavaLite CMS instance with a malicious Host header value. No authentication is required to trigger the injection, making the attack surface accessible to any adversary who can reach the web server. The specific exploitation vector may involve injecting a malicious hostname that, when reflected in generated links or emails, directs users to an attacker-controlled site [3].
Successful exploitation can lead to various security impacts, including cache poisoning, URL redirection, and password reset poisoning. In cache poisoning scenarios, the attacker can manipulate cached pages to serve malicious content to other users. URL redirection can be used to trick users into visiting phishing sites, while password reset poisoning could allow an attacker to intercept password reset emails by controlling the domain in reset links [2][3].
As of the publication date, no official patch from LavaLite is documented; the advisories recommend implementing proper validation of the Host header against a whitelist of allowed server names. Users of LavaLite CMS 9.0.0 should apply a workaround by configuring their web server (e.g., Apache or Nginx) to reject requests with unexpected Host headers or modify the application code to use a trusted base URL derived from the server configuration instead of the header value.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lavalite/cmsPackagist | <= 9.0.0 | — |
Affected products
2- LavaLite/CMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-94q4-v5g6-qp7xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-27237ghsaADVISORY
- lavalite.comghsaWEB
- github.com/M19O/Security-Advisories/tree/main/CVE-2023-27237ghsaWEB
- i.ibb.co/34DSW7B/1.pngghsaWEB
- i.ibb.co/kSkqPhQ/3.pngghsaWEB
- i.ibb.co/mJq9CH8/2.pngghsaWEB
News mentions
0No linked articles in our index yet.