CVE-2025-66509
BaseFortify
Publication date: 2025-12-04
Last updated on: 2026-03-11
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| laradashboard | lara_dashboard | to 2.3.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in LaraDashboard versions 2.3.0 and earlier involves the password reset flow trusting the Host header. Attackers can exploit this by redirecting the administrator's reset token to a server they control. Additionally, this can be combined with the module installation process to automatically execute the ServiceProvider::boot() method, which allows arbitrary PHP code execution.
How can this vulnerability impact me? :
The vulnerability can lead to an attacker gaining unauthorized access to administrator reset tokens and executing arbitrary PHP code on the server. This can result in full compromise of the application, data breaches, and potential control over the affected system.