Логотип exploitDog
bind:CVE-2026-23524
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-23524

Количество 3

Количество 3

nvd логотип

CVE-2026-23524

13 дней назад

Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHP’s unserialize() function without restricting which classes can be instantiated, which leaves users vulnerable to Remote Code Execution. The exploitability of this vulnerability is increased because Redis servers are commonly deployed without authentication, but only affects Laravel Reverb when horizontal scaling is enabled (REVERB_SCALING_ENABLED=true). This issue has been fixed in version 1.7.0. As a workaround, require a strong password for Redis access and ensure the service is only accessible via a private network or local loopback, and/or set REVERB_SCALING_ENABLED=false to bypass the vulnerable logic entirely (if the environment uses only one Reverb node).

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-m27r-m6rx-mhm4

14 дней назад

Laravel Redis Horizontal Scaling Insecure Deserialization

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2026-01045

14 дней назад

Уязвимость функции unserialize() WebSocket-сервера Laravel Reverb, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-23524

Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHP’s unserialize() function without restricting which classes can be instantiated, which leaves users vulnerable to Remote Code Execution. The exploitability of this vulnerability is increased because Redis servers are commonly deployed without authentication, but only affects Laravel Reverb when horizontal scaling is enabled (REVERB_SCALING_ENABLED=true). This issue has been fixed in version 1.7.0. As a workaround, require a strong password for Redis access and ensure the service is only accessible via a private network or local loopback, and/or set REVERB_SCALING_ENABLED=false to bypass the vulnerable logic entirely (if the environment uses only one Reverb node).

CVSS3: 9.8
1%
Низкий
13 дней назад
github логотип
GHSA-m27r-m6rx-mhm4

Laravel Redis Horizontal Scaling Insecure Deserialization

CVSS3: 9.8
1%
Низкий
14 дней назад
fstec логотип
BDU:2026-01045

Уязвимость функции unserialize() WebSocket-сервера Laravel Reverb, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
14 дней назад

Уязвимостей на страницу