{"id":"CVE-2020-36396","details":"A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the \"New\" parameter.","aliases":["GHSA-gjf5-j475-p4g6"],"modified":"2026-04-12T00:00:52.292250Z","published":"2021-07-02T18:15:08.540Z","references":[{"type":"REPORT","url":"https://github.com/LavaLite/cms/issues/322"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/lavalite/cms","events":[{"introduced":"0"},{"last_affected":"2fafa456c72715b2532136c9861d7638948ea66c"}],"database_specific":{"cpe":"cpe:2.3:a:lavalite:lavalite:5.8.0:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"5.8.0"}],"source":"CPE_FIELD"}}],"versions":["5.5.0","5.5.1","5.5.2","5.5.3","5.5.4","5.5.5","5.5.6","5.5.7","5.5.8","5.6.1","5.7.0","v5.1.1","v5.2.1","v5.2.2","v5.2.3","v5.2.4","v5.3.1","v5.3.2","v5.3.3","v5.3.4","v5.3.5","v5.3.6","v5.3.7","v5.4.0","v5.4.1","v5.4.2","v5.4.3","v5.4.4","v5.4.5","v5.8.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-36396.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}