CVE-2025-54068

Scores

EPSS

0.594medium59.4%
0%20%40%60%80%100%

Percentile: 59.4%

CVSS

9.2critical4.0
0246810

CVSS Score: 9.2/10

All CVSS Scores

CVSS 4.0
9.2

Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesnvd

CWEs

CWE-94

Exploits

Exploit ID: CVE-2025-54068

Source: github-poc

URL: https://github.com/haxorstars/CVE-2025-54068

Vulnerable Software (2)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:laravel:livewire:*:*:*:*:*:php:*:*",          "versionEndExcluding": "3.6.4",          "versionStartIncluding"...

Source: anchore_overrides

Type: Configuration

Vendor: *

Product: livewire

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:laravel:livewire:*:*:*:*:*:*:*:*",      "versionEndExcluding": "3.6.4",      "versionStartIncluding": "3.0.0",      "vulnerable": true    }  ...

Source: nvd

End of list