
Cloud Vulnerability DB
A community-led vulnerabilities database
Volt, a widely adopted functional API for Livewire with over 1.08 million downloads, was found to contain a critical remote code execution (RCE) vulnerability identified as CVE-2025-27517. The vulnerability was discovered in versions prior to 1.7.0, where malicious user-crafted request payloads could potentially lead to remote code execution within Volt components. The issue was disclosed on March 5, 2025, and has been assigned a critical severity rating with a CVSSv4 score of 9.3 (Security Online, NVD).
The vulnerability stems from a flaw in Volt's request-handling mechanism, which is integral to its functionality of integrating PHP logic and Blade templates within single-file components. The issue has been classified under CWE-20 (Improper Input Validation), indicating that the root cause relates to insufficient validation of user inputs in the request processing system (NVD).
The exploitation of this vulnerability could result in severe consequences including full system compromise, allowing attackers to manipulate or exfiltrate sensitive data, privilege escalation granting administrative access to the affected system, and the potential deployment of additional malware such as web shells or backdoors for maintaining persistent access (Security Online).
The vulnerability has been patched in Volt version 1.7.0. Users running previous versions are strongly advised to upgrade immediately to this version to mitigate the RCE risk (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."