CVE-2025-66509
Published: 04 December 2025
Summary
CVE-2025-66509 is a critical-severity Improper Access Control (CWE-284) vulnerability in Laradashboard Lara Dashboard. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the flaw in the password reset flow that improperly trusts the Host header, as addressed by the LaraDashboard patch.
Validates the Host header input in the password reset process to prevent manipulation and redirection to attacker-controlled servers.
Ensures secure baseline configuration settings for Laravel applications, including proper Host header validation to mitigate open redirects.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability in the public-facing LaraDashboard web application enables remote exploitation via Host header manipulation in the password reset flow, leading directly to arbitrary PHP code execution.
NVD Description
LaraDashboard is an all-In-one solution to start a Laravel Application. In 2.3.0 and earlier, the password reset flow trusts the Host header, allowing attackers to redirect the administrator’s reset token to an attacker-controlled server. This can be combined with the…
more
module installation process to automatically execute the ServiceProvider::boot() method, enabling arbitrary PHP code execution.
Deeper analysisAI
CVE-2025-66509 affects LaraDashboard, an all-in-one solution for starting Laravel applications, in versions 2.3.0 and earlier. The vulnerability resides in the password reset flow, which improperly trusts the Host header. This flaw enables attackers to redirect an administrator's reset token to a server under their control. When combined with the module installation process, it triggers automatic execution of the ServiceProvider::boot() method, resulting in arbitrary PHP code execution. The issue is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-284 (Improper Access Control).
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. By manipulating the Host header during the password reset process, they can intercept the administrator's reset token and redirect it to their own server. Subsequent integration with module installation allows the attacker to craft a malicious module that executes arbitrary PHP code upon booting the ServiceProvider, potentially leading to full server compromise, data theft, or further persistence.
Mitigation details are provided in the LaraDashboard GitHub security advisory (GHSA-j9mm-c9cj-pc82) and a related commit (cc42f9cdf8e59bce794ee2d812a9709b1e6efa87), which address the Host header trust issue in the password reset flow. Security practitioners should update to a patched version beyond 2.3.0 and review configurations for Host header validation in Laravel-based applications.
Details
- CWE(s)