CVE-2025-54068
high-risk
Published 2025-07-17
Livewire is a full-stack framework for Laravel. In Livewire v3 up to and including v3.6.3, a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does not require authentication or user interaction. This issue has been patched in Livewire v3.6.4. All users are strongly encouraged to upgrade to this version or later as soon as possible. No known workarounds are available.
Do I need to act?
!
59.4% chance of exploitation in next 30 days
EPSS score — higher than 41% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (5)
Release Notes
https://github.com/livewire/livewire/releases/tag/v3.6.4
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-...
Third Party Advisory
https://www.threathunter.ai/blog/iranian-threat-actor-tools-techniques-iocs-ioas...
62
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
25/34 · High
Exposure
5/34 · Minimal