CVE-2025-54068
KEVW Livewire v3 do 3.6.3 występuje podatność umożliwiająca zdalne wykonanie kodu przez nieautoryzowanych atakujących.
Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 46.0% |
| Opublikowano (NVD) | 2025-07-17 19:15:25 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-20 18:36:12 UTC |
- https://github.com/livewire/livewire/commit/ef04be759da41b14d2d129e670533180a44987dc (security-advisories@github.com) [Patch]
- https://github.com/livewire/livewire/releases/tag/v3.6.4 (security-advisories@github.com) [Release Notes]
- https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3 (security-advisories@github.com) [Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-54068 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]
- https://www.threathunter.ai/blog/iranian-threat-actor-tools-techniques-iocs-ioas/ (134c704f-9b21-4f2e-91b3-4a467353bcc0) [Third Party Advisory]