Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 19 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lavalite lavalite
|
|
| CPEs | cpe:2.3:a:lavalite:lavalite:10.1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Lavalite lavalite
|
Tue, 17 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lavalite
Lavalite cms |
|
| Vendors & Products |
Lavalite
Lavalite cms |
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. The vulnerability exists because the admin and user authentication guards share the same user provider without role-based access control verification. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-17T15:14:47.415Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70866
Updated: 2026-02-17T15:12:33.714Z
Status : Analyzed
Published: 2026-02-13T22:16:09.923
Modified: 2026-02-19T19:35:00.703
Link: CVE-2025-70866
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:50:12Z