Remote Code Execution Vulnerability in Laravel Reverb by Laravel
CVE-2026-23524

9.8CRITICAL

Key Information:

Vendor

Laravel

Status
Vendor
CVE Published:
21 January 2026

What is CVE-2026-23524?

CVE-2026-23524 is a critical remote code execution vulnerability found in Laravel Reverb, an essential component that provides real-time WebSocket communication for Laravel applications. This vulnerability arises because, in versions 1.6.3 and below, Reverb allows data from the Redis channel to be passed directly into PHP's unserialize() function without implementing necessary restrictions on which classes can be instantiated. As a result, this oversight can enable attackers to execute arbitrary code on the server. The risk is particularly pronounced when horizontal scaling is enabled, as this facilitates easier access for potential exploitation. Given that Redis servers are often deployed without robust authentication measures, the vulnerability can lead to severe impacts if not addressed promptly. The issue has been mitigated in version 1.7.0, but organizations must implement strong security practices, including enforcing password protection on Redis and limiting server access to secure networks.

Potential Impact of CVE-2026-23524

  1. Remote Code Execution: The primary impact of this vulnerability is that it allows unauthorized users to execute arbitrary code on the server. This can lead to complete system compromise, enabling attackers to gain control over the affected application and potentially the entire underlying infrastructure.

  2. Data Breach Risks: By exploiting this vulnerability, threat actors can access sensitive data stored within the application, which may include user information, application secrets, and other critical data. This can result in significant reputational damage and regulatory repercussions for organizations.

  3. Increased Attack Surface: The ease of exploitation, especially in environments where Redis servers lack authentication, increases the attack surface for malicious actors. When combined with inadequate security measures, this vulnerability can lead to broader compromise, allowing attackers to pivot from the Laravel application to other systems within the network.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

reverb < 1.7.0

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.