GHSA-29CQ-5W36-X7W3
Vulnerability from github – Published: 2025-07-17 20:26 – Updated: 2025-07-17 22:06Impact
In Livewire v3 (≤ 3.6.3), a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction.
Patches
This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible.
Workarounds
There is no known workaround at this time. Users are strongly advised to upgrade to a patched version immediately.
Resources
No public references available at this time to avoid exposure. Details will be published after a responsible disclosure window.
{
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "livewire/livewire"
},
"ranges": [
{
"events": [
{
"introduced": "3.0.0-beta.1"
},
{
"fixed": "3.6.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-54068"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": true,
"github_reviewed_at": "2025-07-17T20:26:45Z",
"nvd_published_at": "2025-07-17T19:15:25Z",
"severity": "CRITICAL"
},
"details": "### Impact\nIn Livewire v3 (\u2264 3.6.3), a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction.\n\n### Patches\nThis issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible.\n\n### Workarounds\nThere is no known workaround at this time. Users are strongly advised to upgrade to a patched version immediately.\n\n### Resources\nNo public references available at this time to avoid exposure. Details will be published after a responsible disclosure window.",
"id": "GHSA-29cq-5w36-x7w3",
"modified": "2025-07-17T22:06:10Z",
"published": "2025-07-17T20:26:45Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/livewire/livewire/security/advisories/GHSA-29cq-5w36-x7w3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54068"
},
{
"type": "WEB",
"url": "https://github.com/livewire/livewire/commit/ef04be759da41b14d2d129e670533180a44987dc"
},
{
"type": "PACKAGE",
"url": "https://github.com/livewire/livewire"
},
{
"type": "WEB",
"url": "https://github.com/livewire/livewire/releases/tag/v3.6.4"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Livewire is vulnerable to remote command execution during component property update hydration"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.