A severe security vulnerability tracked as CVE-2024-55661, has been found in Laravel Pulse, a popular tool for real-time monitoring and performance analysis of Laravel applications. This issue enables authenticated users with access to the Pulse dashboard to run arbitrary code on the server, potentially resulting in complete system compromise. The vulnerability is located in the remember() method within the Laravel\Pulse\Livewire\Concerns\RemembersQueries trait. This method, accessible via Livewire components, can be exploited to invoke arbitrary callables (such as functions or static methods) within the application. Specifically, the vulnerability can be triggered when the callable has no parameters or only non-strictly typed parameters. For an attacker to exploit this flaw, they need access to the Pulse dashboard and must trigger the vulnerability via a Livewire component. One example of an exploit would be using the remember() method to call the Config::all() method, potentially exposing sensitive configuration information. However, the risk extends beyond information disclosure, as attackers could craft payloads capable of executing arbitrary code on the server, leading to complete control over the affected system. This vulnerability affects all versions of Laravel Pulse prior to 1.3.1. Users are highly recommended to update to version 1.3.1 or later, as it includes a fix that addresses this vulnerability. The discovery and reporting of this flaw by security researcher Jeremy Angele highlights the importance of applying timely updates to maintain the security of Laravel-based applications.
A newly identified security flaw in early OpenVPN 2.7 releases has sparked major concern, as it allows malicious VPN servers to execute unauthorized commands on client devices. The...
Researchers at Kaspersky uncovered Operation ForumTroll, a sophisticated espionage campaign exploiting a zero-day vulnerability in Google Chrome (CVE-2025-2783) to deliver the comm...
Security researchers disclosed a vulnerability in OpenAI’s ChatGPT Atlas browser—named “Tainted Memories”—that allows an attacker to invisibly inject persistent, attacker...