CVE-2026-23524

Source
https://cve.org/CVERecord?id=CVE-2026-23524
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23524.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23524
Aliases
Published
2026-01-21T22:07:55.682Z
Modified
2026-01-28T05:50:57.293427Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Laravel Redis Horizontal Scaling Insecure Deserialization
Details

Laravel Reverb provides a real-time WebSocket communication backend for Laravel applications. In versions 1.6.3 and below, Reverb passes data from the Redis channel directly into PHP’s unserialize() function without restricting which classes can be instantiated, which leaves users vulnerable to Remote Code Execution. The exploitability of this vulnerability is increased because Redis servers are commonly deployed without authentication, but only affects Laravel Reverb when horizontal scaling is enabled (REVERBSCALINGENABLED=true). This issue has been fixed in version 1.7.0. As a workaround, require a strong password for Redis access and ensure the service is only accessible via a private network or local loopback, and/or set REVERBSCALINGENABLED=false to bypass the vulnerable logic entirely (if the environment uses only one Reverb node).

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23524.json",
    "cwe_ids": [
        "CWE-502"
    ]
}
References

Affected packages

Git / github.com/laravel/reverb

Affected ranges

Type
GIT
Repo
https://github.com/laravel/reverb
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.0.0
v1.0.0-beta1
v1.0.0-beta10
v1.0.0-beta11
v1.0.0-beta12
v1.0.0-beta13
v1.0.0-beta14
v1.0.0-beta2
v1.0.0-beta3
v1.0.0-beta4
v1.0.0-beta5
v1.0.0-beta6
v1.0.0-beta7
v1.0.0-beta8
v1.0.0-beta9
v1.1.0
v1.2.0
v1.3.0
v1.3.1
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.4.7
v1.4.8
v1.5.0
v1.5.1
v1.6.0
v1.6.1
v1.6.2
v1.6.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23524.json"