CVE-2025-54068

CWE-94Code Injection7 documents7 sources
9.2
CVSS
CRITICAL
EPSS58.3%(98th)
CISA KEVPublic Exploit
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

NVDlaravel/livewire3.0.03.6.4
Packagistlivewire/livewire3.0.0-beta.13.6.4
Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. ...

🔴Vulnerability Details

4
CVEList
Livewire vulnerable to remote command execution during property update hydration2025-07-17
OSV
Livewire is vulnerable to remote command execution during component property update hydration2025-07-17
GHSA
Livewire is vulnerable to remote command execution during component property update hydration2025-07-17
VulnCheck
Laravel livewire Improper Control of Generation of Code ('Code Injection')2025

💥Exploits & PoCs

1
Nuclei
Laravel Livewire v3 - Remote Command Execution

📋Vendor Advisories

1
CISA
Laravel Livewire Code Injection Vulnerability2026-03-20