Cyber Posture

CVE-2025-66509

Critical

Published: 04 December 2025

Published
04 December 2025
Modified
11 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66509 is a critical-severity Improper Access Control (CWE-284) vulnerability in Laradashboard Lara Dashboard. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the flaw in the password reset flow that improperly trusts the Host header, as addressed by the LaraDashboard patch.

prevent

Validates the Host header input in the password reset process to prevent manipulation and redirection to attacker-controlled servers.

prevent

Ensures secure baseline configuration settings for Laravel applications, including proper Host header validation to mitigate open redirects.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability in the public-facing LaraDashboard web application enables remote exploitation via Host header manipulation in the password reset flow, leading directly to arbitrary PHP code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

LaraDashboard is an all-In-one solution to start a Laravel Application. In 2.3.0 and earlier, the password reset flow trusts the Host header, allowing attackers to redirect the administrator’s reset token to an attacker-controlled server. This can be combined with the…

more

module installation process to automatically execute the ServiceProvider::boot() method, enabling arbitrary PHP code execution.

Deeper analysisAI

CVE-2025-66509 affects LaraDashboard, an all-in-one solution for starting Laravel applications, in versions 2.3.0 and earlier. The vulnerability resides in the password reset flow, which improperly trusts the Host header. This flaw enables attackers to redirect an administrator's reset token to a server under their control. When combined with the module installation process, it triggers automatic execution of the ServiceProvider::boot() method, resulting in arbitrary PHP code execution. The issue is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-284 (Improper Access Control).

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By manipulating the Host header during the password reset process, they can intercept the administrator's reset token and redirect it to their own server. Subsequent integration with module installation allows the attacker to craft a malicious module that executes arbitrary PHP code upon booting the ServiceProvider, potentially leading to full server compromise, data theft, or further persistence.

Mitigation details are provided in the LaraDashboard GitHub security advisory (GHSA-j9mm-c9cj-pc82) and a related commit (cc42f9cdf8e59bce794ee2d812a9709b1e6efa87), which address the Host header trust issue in the password reset flow. Security practitioners should update to a patched version beyond 2.3.0 and review configurations for Host header validation in Laravel-based applications.

Details

CWE(s)

Affected Products

laradashboard
lara dashboard
≤ 2.3.0

CVEs Like This One

CVE-2026-21962Shared CWE-284
CVE-2026-34456Shared CWE-284
CVE-2026-21535Shared CWE-284
CVE-2025-50870Shared CWE-284
CVE-2025-26062Shared CWE-284
CVE-2025-50105Shared CWE-284
CVE-2025-56015Shared CWE-284
CVE-2026-21889Shared CWE-284
CVE-2025-70363Shared CWE-284
CVE-2024-40749Shared CWE-284

References