LavaLite CMS versions up to and including 10.1.0 contain a stored cross-site scripting vulnerability in the package creation and search functionality. Authenticated users can supply crafted HTML or JavaScript in the package Name or Description fields that is stored and later rendered without proper output encoding in package search results. When other users view search results that include the malicious package, the injected script executes in their browsers, potentially enabling session hijacking, credential theft, and unauthorized actions in the context of the victim.
References
| Link | Resource |
|---|---|
| https://github.com/LavaLite/cms/issues/420 | Exploit Issue Tracking |
| https://lavalite.org/ | Product |
| https://www.vulncheck.com/advisories/lavalite-cms-stored-xss-via-package-creation-and-search | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-23 17:16
Updated : 2026-01-29 19:06
NVD link : CVE-2025-71177
Mitre link : CVE-2025-71177
CVE.ORG link : CVE-2025-71177
JSON object : View
Products Affected
lavalite
- lavalite
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
