SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Laravel Livewire insecure deserialization attempt
This rule looks for HTTP requests to the "/livewire/update" endpoint that contain serialized payload elements and class identifiers indicative of a malicious gadget chain. Successful exploitation could allow an attacker to execute arbitrary code on the targeted server.
This rule fires on attempts to exploit a code injection vulnerability in Laravel Livewire web applications.
No public information
No known false positives
Cisco Talos Intelligence Group
Rule Categories::Server::Web Applications
MITRE::ATT&CK Framework::Enterprise::Initial Access::Exploit Public-Facing Application
Vulnerability::Severity::Critical
Vulnerability::Severity::High
Insecure Deserialization
Insecure Deserialization relates to web application security. Applications turn an object into data through serialization; the reverse of that process, deserialization, can be vulnerable to attacks when the application trusts the data that is being deserialized. Serialized data is machine readable and not encrypted; serialized user-supplied data should not be trusted. Deserialization attacks can lead to remote code execution.
CVE-2025-54068 |
Loading description
|