Vulnerability Description
LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and user authentication guards share the same user provider without role-based access control verification.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lavalite | Lavalite | 10.1.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/gkjzjh146/6d541c80b0666a596581ccd85bd10058ExploitThird Party Advisory
- https://github.com/LavaLite/cms/releases/tag/v10.1.0ProductRelease Notes
FAQ
What is CVE-2025-70866?
CVE-2025-70866 is a vulnerability with a CVSS score of 8.8 (HIGH). LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The...
How severe is CVE-2025-70866?
CVE-2025-70866 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-70866?
Check the references section above for vendor advisories and patch information. Affected products include: Lavalite Lavalite.