Remote Command Execution Vulnerability in Livewire Framework from Laravel
CVE-2025-54068
Key Information:
Badges
What is CVE-2025-54068?
CVE-2025-54068 is a significant vulnerability identified in the Livewire framework, which is designed for building dynamic user interfaces with Laravel, a popular PHP framework. This particular flaw exists in Livewire versions up to and including v3.6.3, allowing unauthenticated attackers to execute arbitrary commands remotely under specific conditions. The vulnerability arises from issues in how component property updates are handled, leading to potential command execution without requiring any authentication or user interaction. This can critically undermine the security posture of organizations relying on Livewire for their applications, allowing attackers to manipulate server behaviors and potentially gain unauthorized access to sensitive data or system functionality.
Potential impact of CVE-2025-54068
-
Unauthorized Remote Command Execution: The vulnerability allows attackers to execute commands on the server without needing authentication. This could lead to complete takeover of the affected application, enabling malicious actors to run arbitrary code and take further actions against the organization.
-
Data Breach Risks: Exploitation of this vulnerability may expose sensitive application data to unauthorized users. Attackers can access, modify, or exfiltrate sensitive data, leading to potential compliance violations and reputational damage.
-
Increased Attack Surface: Given that exploitation does not require user interaction or authentication, the vulnerability presents a broader attack surface. This raises concerns for ongoing application monitoring and security hygiene, as attackers could exploit this flaw to facilitate further attacks or spread malware within the network.
Affected Version(s)
livewire >= 3.0.0-beta.1, < 3.6.4
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
