
Cloud Vulnerability DB
A community-led vulnerabilities database
A high-severity vulnerability (GHSA-jwvj-pwww-3mj5) was identified in the Laravel framework affecting versions 6.x (>=6.0.0, <6.20.14), 7.x (>=7.0.0, <7.30.4), and 8.x (>=8.0.0, <8.24.0). This vulnerability is a follow-up to a previous security issue (GHSA-3p32-j457-pg5x) and involves unexpected database bindings via requests (GitHub Advisory).
The vulnerability occurs when a request is crafted where a field that is normally a non-array value is submitted as an array, and that input is not properly validated or cast to its expected type before being passed to the query builder. This can result in an unexpected number of query bindings being added to the query (GitHub Advisory).
The impact of this vulnerability varies depending on the specific query implementation. In some cases, it may result in no results being returned by the query builder. However, more critically, certain queries could be affected in a way that causes them to return unexpected results, potentially leading to data exposure or manipulation (GitHub Advisory).
The vulnerability has been patched in Laravel versions 6.20.14, 7.30.4, and 8.24.0. Users should upgrade to these or later versions to mitigate the vulnerability (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."