Taylor Otwell

3 exploits Active since Dec 2021
CVE-2020-19316 WRITEUP HIGH WRITEUP
Laravel Framework < 5.8.17 - OS Command Injection
OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.
CVSS 8.8
CVE-2021-43808 WRITEUP MEDIUM WRITEUP
Laravel <8.75.0, 7.30.6, 6.20.42 - XSS
Laravel is a web application framework. Laravel prior to versions 8.75.0, 7.30.6, and 6.20.42 contain a possible cross-site scripting (XSS) vulnerability in the Blade templating engine. A broken HTML element may be clicked and the user taken to another location in their browser due to XSS. This is due to the user being able to guess the parent placeholder SHA-1 hash by trying common names of sections. If the parent template contains an exploitable HTML structure an XSS vulnerability can be exposed. This vulnerability has been patched in versions 8.75.0, 7.30.6, and 6.20.42 by determining the parent placeholder at runtime and using a random hash that is unique to each request.
CVSS 5.3
CVE-2026-23524 WRITEUP CRITICAL WRITEUP
Laravel Reverb <1.6.3 - RCE
Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHP’s unserialize() function without restricting which classes can be instantiated, which leaves users vulnerable to Remote Code Execution. The exploitability of this vulnerability is increased because Redis servers are commonly deployed without authentication, but only affects Laravel Reverb when horizontal scaling is enabled (REVERB_SCALING_ENABLED=true). This issue has been fixed in version 1.7.0. As a workaround, require a strong password for Redis access and ensure the service is only accessible via a private network or local loopback, and/or set REVERB_SCALING_ENABLED=false to bypass the vulnerable logic entirely (if the environment uses only one Reverb node).
CVSS 9.8