CVE-2025-54068
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-17

Last updated on: 2026-03-20

Assigner: GitHub, Inc.

Description
Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-17
Last Modified
2026-03-20
Generated
2026-05-07
AI Q&A
2025-07-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
laravel livewire From 3.0.0 (inc) to 3.6.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Livewire v3 up to version 3.6.3 and allows unauthenticated attackers to execute remote commands under specific conditions. It arises from how Livewire handles the hydration of component property updates, where certain updates can be exploited to run arbitrary commands without requiring authentication or user interaction. The issue is specific to Livewire v3 and has been fixed in version 3.6.4. [2]


How can this vulnerability impact me? :

The vulnerability can lead to remote command execution by unauthenticated attackers, potentially compromising the confidentiality, integrity, and availability of the affected system. This means attackers could execute arbitrary commands remotely, leading to severe security breaches including data theft, system manipulation, or denial of service. [2]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade Livewire to version 3.6.4 or later, as this version contains the fix for the vulnerability. No known workarounds are available, so upgrading as soon as possible is strongly recommended. [2, 1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart