Packagist (Composer) package
lavalite/cms
pkg:composer/lavalite/cms
Vulnerabilities (14)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-71177 | — | <= 10.1.0 | — | Jan 23, 2026 | LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rend | ||
| CVE-2024-31828 | — | — | — | Apr 26, 2024 | Cross Site Scripting vulnerability in Lavalite CMS v.10.1.0 allows attackers to execute arbitrary code and obtain sensitive information via a crafted payload to the URL. | ||
| CVE-2023-30124 | — | <= 9.0.0 | — | May 18, 2023 | LavaLite v9.0.0 is vulnerable to Cross Site Scripting (XSS). | ||
| CVE-2023-27238 | — | <= 9.0.0 | — | May 12, 2023 | LavaLite CMS v 9.0.0 was discovered to be vulnerable to web cache poisoning. | ||
| CVE-2023-27237 | — | <= 9.0.0 | — | May 12, 2023 | LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack. | ||
| CVE-2022-42188 | — | — | — | Oct 18, 2022 | In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. | ||
| CVE-2020-23234 | — | <= 5.8.0 | — | Jul 26, 2021 | Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as "ontoggle,". | ||
| CVE-2020-23700 | — | <= 5.8.0 | — | Jul 7, 2021 | Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature. | ||
| CVE-2020-36397 | — | <= 5.8.0 | — | Jul 2, 2021 | A stored cross site scripting (XSS) vulnerability in the /admin/contact/contact component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter. | ||
| CVE-2020-36396 | — | <= 5.8.0 | — | Jul 2, 2021 | A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter. | ||
| CVE-2020-36395 | — | < 5.8.0 | 5.8.0 | Jul 2, 2021 | A stored cross site scripting (XSS) vulnerability in the /admin/user/team component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter. | ||
| CVE-2020-28124 | — | < 7.0.1 | 7.0.1 | Apr 14, 2021 | Cross Site Scripting (XSS) in LavaLite 5.8.0 via the Address field. | ||
| CVE-2018-16551 | — | >= 0 | — | Sep 5, 2018 | LavaLite 5.5 has XSS via a /edit URI, as demonstrated by client/job/job/Zy8PWBekrJ/edit. | ||
| CVE-2017-1000467 | — | <= 5.2.4 | — | Jan 3, 2018 | LavaLite version 5.2.4 is vulnerable to stored cross-site scripting vulnerability, within the blog creation page, which can result in disruption of service and execution of javascript code. |
- CVE-2025-71177Jan 23, 2026affected <= 10.1.0
LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rend
- CVE-2024-31828Apr 26, 2024
Cross Site Scripting vulnerability in Lavalite CMS v.10.1.0 allows attackers to execute arbitrary code and obtain sensitive information via a crafted payload to the URL.
- CVE-2023-30124May 18, 2023affected <= 9.0.0
LavaLite v9.0.0 is vulnerable to Cross Site Scripting (XSS).
- CVE-2023-27238May 12, 2023affected <= 9.0.0
LavaLite CMS v 9.0.0 was discovered to be vulnerable to web cache poisoning.
- CVE-2023-27237May 12, 2023affected <= 9.0.0
LavaLite CMS v 9.0.0 was discovered to be vulnerable to a host header injection attack.
- CVE-2022-42188Oct 18, 2022
In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server.
- CVE-2020-23234Jul 26, 2021affected <= 5.8.0
Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as "ontoggle,".
- CVE-2020-23700Jul 7, 2021affected <= 5.8.0
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature.
- CVE-2020-36397Jul 2, 2021affected <= 5.8.0
A stored cross site scripting (XSS) vulnerability in the /admin/contact/contact component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
- CVE-2020-36396Jul 2, 2021affected <= 5.8.0
A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
- CVE-2020-36395Jul 2, 2021affected < 5.8.0fixed 5.8.0
A stored cross site scripting (XSS) vulnerability in the /admin/user/team component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
- CVE-2020-28124Apr 14, 2021affected < 7.0.1fixed 7.0.1
Cross Site Scripting (XSS) in LavaLite 5.8.0 via the Address field.
- CVE-2018-16551Sep 5, 2018affected >= 0
LavaLite 5.5 has XSS via a /edit URI, as demonstrated by client/job/job/Zy8PWBekrJ/edit.
- CVE-2017-1000467Jan 3, 2018affected <= 5.2.4
LavaLite version 5.2.4 is vulnerable to stored cross-site scripting vulnerability, within the blog creation page, which can result in disruption of service and execution of javascript code.