CVE-2025-67507: CWE-287: Improper Authentication in filamentphp filament
Filament is a collection of full-stack components for accelerated Laravel development. Versions 4.0.0 through 4.3.0 contain a flaw in the handling of recovery codes for app-based multi-factor authentication, allowing the same recovery code to be reused indefinitely. This issue does not affect email-based MFA. It also only applies when recovery codes are enabled. This issue is fixed in version 4.3.1.
AI Analysis
Technical Summary
CVE-2025-67507 is a vulnerability classified under CWE-287 (Improper Authentication) and CWE-288 (Authentication Bypass Using an Alternate Path or Channel) affecting filamentphp's filament product versions 4.0.0 through 4.3.0. Filament is a set of full-stack components designed to accelerate Laravel development. The vulnerability arises from flawed handling of recovery codes used in app-based multi-factor authentication (MFA). Specifically, the recovery codes intended for one-time use can be reused indefinitely, allowing attackers who obtain a single recovery code to bypass MFA protections repeatedly. This flaw does not impact email-based MFA methods and only applies if recovery codes are enabled by the application. The vulnerability is remotely exploitable without requiring any privileges or user interaction, increasing its risk profile. Successful exploitation compromises confidentiality, integrity, and availability by enabling unauthorized access to user accounts and potentially administrative functions. The issue was publicly disclosed on December 10, 2025, with a CVSS v3.1 base score of 8.1, indicating high severity. The vendor addressed the vulnerability in filament version 4.3.1, which corrects the recovery code handling to enforce single-use constraints. No known exploits are currently reported in the wild, but the ease of exploitation and impact warrant immediate remediation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on filamentphp's filament framework for Laravel-based web applications that implement app-based MFA with recovery codes enabled. Attackers exploiting this flaw can bypass MFA protections by reusing recovery codes indefinitely, leading to unauthorized account access, data breaches, and potential lateral movement within networks. The compromise of administrative accounts could result in full system control, data manipulation, or service disruption. Given the widespread adoption of Laravel in Europe, particularly in countries with strong PHP developer communities such as Germany, France, the United Kingdom, and the Netherlands, the threat surface is considerable. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) face heightened regulatory and reputational risks if exploited. The vulnerability's remote exploitability without user interaction further increases the likelihood of automated attacks targeting vulnerable systems.
Mitigation Recommendations
European organizations should immediately upgrade filamentphp's filament to version 4.3.1 or later to remediate this vulnerability. Until the upgrade is applied, organizations should consider disabling app-based MFA recovery codes or switching to email-based MFA recovery methods, which are not affected by this flaw. Conduct a thorough audit of all issued recovery codes to identify and revoke any that may have been compromised or reused. Implement enhanced monitoring and alerting for unusual authentication activities, such as repeated use of recovery codes or anomalous login patterns. Educate developers and administrators on secure MFA implementation best practices, emphasizing the importance of single-use recovery codes. Additionally, review and harden access controls and consider implementing compensating controls such as IP whitelisting or adaptive authentication to reduce risk exposure. Regularly verify that all third-party components, including filamentphp, are kept up to date with security patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-67507: CWE-287: Improper Authentication in filamentphp filament
Description
Filament is a collection of full-stack components for accelerated Laravel development. Versions 4.0.0 through 4.3.0 contain a flaw in the handling of recovery codes for app-based multi-factor authentication, allowing the same recovery code to be reused indefinitely. This issue does not affect email-based MFA. It also only applies when recovery codes are enabled. This issue is fixed in version 4.3.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-67507 is a vulnerability classified under CWE-287 (Improper Authentication) and CWE-288 (Authentication Bypass Using an Alternate Path or Channel) affecting filamentphp's filament product versions 4.0.0 through 4.3.0. Filament is a set of full-stack components designed to accelerate Laravel development. The vulnerability arises from flawed handling of recovery codes used in app-based multi-factor authentication (MFA). Specifically, the recovery codes intended for one-time use can be reused indefinitely, allowing attackers who obtain a single recovery code to bypass MFA protections repeatedly. This flaw does not impact email-based MFA methods and only applies if recovery codes are enabled by the application. The vulnerability is remotely exploitable without requiring any privileges or user interaction, increasing its risk profile. Successful exploitation compromises confidentiality, integrity, and availability by enabling unauthorized access to user accounts and potentially administrative functions. The issue was publicly disclosed on December 10, 2025, with a CVSS v3.1 base score of 8.1, indicating high severity. The vendor addressed the vulnerability in filament version 4.3.1, which corrects the recovery code handling to enforce single-use constraints. No known exploits are currently reported in the wild, but the ease of exploitation and impact warrant immediate remediation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on filamentphp's filament framework for Laravel-based web applications that implement app-based MFA with recovery codes enabled. Attackers exploiting this flaw can bypass MFA protections by reusing recovery codes indefinitely, leading to unauthorized account access, data breaches, and potential lateral movement within networks. The compromise of administrative accounts could result in full system control, data manipulation, or service disruption. Given the widespread adoption of Laravel in Europe, particularly in countries with strong PHP developer communities such as Germany, France, the United Kingdom, and the Netherlands, the threat surface is considerable. Organizations in sectors with stringent data protection requirements (e.g., finance, healthcare, government) face heightened regulatory and reputational risks if exploited. The vulnerability's remote exploitability without user interaction further increases the likelihood of automated attacks targeting vulnerable systems.
Mitigation Recommendations
European organizations should immediately upgrade filamentphp's filament to version 4.3.1 or later to remediate this vulnerability. Until the upgrade is applied, organizations should consider disabling app-based MFA recovery codes or switching to email-based MFA recovery methods, which are not affected by this flaw. Conduct a thorough audit of all issued recovery codes to identify and revoke any that may have been compromised or reused. Implement enhanced monitoring and alerting for unusual authentication activities, such as repeated use of recovery codes or anomalous login patterns. Educate developers and administrators on secure MFA implementation best practices, emphasizing the importance of single-use recovery codes. Additionally, review and harden access controls and consider implementing compensating controls such as IP whitelisting or adaptive authentication to reduce risk exposure. Regularly verify that all third-party components, including filamentphp, are kept up to date with security patches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-08T21:36:28.780Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6938c96abc985c89a39766e8
Added to database: 12/10/2025, 1:14:18 AM
Last enriched: 12/17/2025, 1:31:32 AM
Last updated: 2/6/2026, 5:54:50 PM
Views: 384
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1769: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Xerox CentreWare
MediumCVE-2026-2059: SQL Injection in SourceCodester Medical Center Portal Management System
MediumCVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.