Cyber Posture

CVE-2025-66509

Critical

Published: 04 December 2025

Published
04 December 2025
Modified
11 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 24.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-66509 affects LaraDashboard, an all-in-one solution for starting Laravel applications, in versions 2.3.0 and earlier. The vulnerability resides in the password reset flow, which improperly trusts the Host header. This flaw enables attackers to redirect an administrator's reset token to a server under their control. When combined with the module installation process, it triggers automatic execution of the ServiceProvider::boot() method, resulting in arbitrary PHP code execution. The issue is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-284 (Improper Access Control).

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By manipulating the Host header during the password reset process, they can intercept the administrator's reset token and redirect it to their own server. Subsequent integration with module installation allows the attacker to craft a malicious module that executes arbitrary PHP code upon booting the ServiceProvider, potentially leading to full server compromise, data theft, or further persistence.

Mitigation details are provided in the LaraDashboard GitHub security advisory (GHSA-j9mm-c9cj-pc82) and a related commit (cc42f9cdf8e59bce794ee2d812a9709b1e6efa87), which address the Host header trust issue in the password reset flow. Security practitioners should update to a patched version beyond 2.3.0 and review configurations for Host header validation in Laravel-based applications.

Details

CWE(s)
CWE-284

Affected Products

laradashboard
lara dashboard
≤ 2.3.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability in the public-facing LaraDashboard web application enables remote exploitation via Host header manipulation in the password reset flow, leading directly to arbitrary PHP code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References