Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23524: CWE-502: Deserialization of Untrusted Data in laravel reverb

0
Critical
VulnerabilityCVE-2026-23524cvecve-2026-23524cwe-502
Published: Wed Jan 21 2026 (01/21/2026, 22:07:55 UTC)
Source: CVE Database V5
Vendor/Project: laravel
Product: reverb

Description

CVE-2026-23524 is a critical remote code execution vulnerability in Laravel Reverb versions prior to 1. 7. 0. It arises from unsafe deserialization of untrusted data passed from Redis channels directly into PHP's unserialize() function without class restrictions. The vulnerability is exploitable without authentication and requires no user interaction, but only affects deployments with horizontal scaling enabled (REVERB_SCALING_ENABLED=true). Since Redis servers are often deployed without authentication and may be exposed on private or public networks, attackers can exploit this flaw to execute arbitrary code remotely. The issue has been fixed in version 1. 7. 0, and mitigations include securing Redis with strong passwords, restricting network access, or disabling horizontal scaling if possible. European organizations using Laravel Reverb in horizontally scaled environments are at risk, especially those with Redis instances exposed or weakly protected.

AI-Powered Analysis

AILast updated: 01/21/2026, 22:35:29 UTC

Technical Analysis

Laravel Reverb is a real-time WebSocket backend for Laravel applications that uses Redis channels to pass messages. In versions 1.6.3 and below, Reverb directly passes data received from Redis into PHP's unserialize() function without restricting which classes can be instantiated. This unsafe deserialization (CWE-502) allows attackers to craft malicious payloads that, when deserialized, can trigger remote code execution (RCE) on the server. The vulnerability is particularly dangerous because Redis servers are frequently deployed without authentication, allowing attackers to publish malicious payloads to Redis channels. However, the vulnerability only manifests when horizontal scaling is enabled (REVERB_SCALING_ENABLED=true), as this triggers the vulnerable deserialization logic. The flaw was fixed in version 1.7.0 by presumably adding class restrictions or safer deserialization methods. The CVSS 3.1 score of 9.8 indicates a critical severity with network attack vector, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the ease of exploitation and common Redis misconfigurations make this a high-risk issue. Workarounds include enforcing strong Redis authentication, limiting Redis access to private networks or localhost, or disabling horizontal scaling to avoid the vulnerable code path.

Potential Impact

For European organizations, this vulnerability poses a severe risk of remote code execution leading to full system compromise, data breaches, service disruption, and lateral movement within networks. Organizations using Laravel Reverb in horizontally scaled environments with Redis instances exposed or weakly secured are particularly vulnerable. Exploitation could lead to theft of sensitive data, deployment of ransomware or malware, and disruption of critical web services. Given the popularity of Laravel in Europe’s web development ecosystem and the common use of Redis for caching and messaging, many organizations could be affected. The impact extends to cloud-hosted environments where Redis instances might be misconfigured or accessible over public or shared networks. The critical severity and ease of exploitation without authentication make this a top priority for incident prevention and response.

Mitigation Recommendations

1. Immediately upgrade Laravel Reverb to version 1.7.0 or later to apply the official fix. 2. If upgrading is not immediately possible, disable horizontal scaling by setting REVERB_SCALING_ENABLED=false to bypass the vulnerable deserialization logic. 3. Enforce strong authentication on Redis servers by setting robust passwords and enabling Redis AUTH. 4. Restrict Redis network access to trusted hosts only, preferably limiting it to localhost or private network segments using firewall rules or network ACLs. 5. Monitor Redis logs and network traffic for suspicious publish commands or unexpected connections. 6. Conduct code audits to ensure no other unsafe unserialize() calls exist in the application stack. 7. Implement application-layer input validation and consider using safer serialization formats like JSON instead of PHP serialization. 8. Regularly scan and audit infrastructure for exposed Redis instances and remediate any found. 9. Educate development and operations teams about the risks of unsafe deserialization and secure Redis deployment best practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T18:22:43.980Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697151484623b1157cf00eed

Added to database: 1/21/2026, 10:20:56 PM

Last enriched: 1/21/2026, 10:35:29 PM

Last updated: 1/22/2026, 1:08:40 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats