Cyber Posture

CVE-2025-14894

Critical

Published: 16 January 2026

Published
16 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14894 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Livewire-Filemanager Filemanager. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates file type and MIME validation on uploads to block malicious PHP files as missing in LivewireFilemanagerComponent.php.

prevent

Restricts publicly accessible content to prevent execution of uploaded malicious files via the exposed /storage/ URL in typical Laravel setups.

prevent

Restricts dangerous information inputs like unrestricted file uploads to only safe types, mitigating CWE-434 unrestricted upload of dangerous files.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
Why these techniques?

Unrestricted file upload (CWE-434) in a public-facing Laravel component directly enables remote code execution via web shell deployment.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Livewire Filemanager, commonly used in Laravel applications, contains LivewireFilemanagerComponent.php, which does not perform file type and MIME validation, allowing for RCE through upload of a malicious php file that can then be executed via the /storage/ URL if a commonly…

more

performed setup process within Laravel applications has been completed.

Deeper analysisAI

CVE-2025-14894 is a critical vulnerability in the Livewire Filemanager, a component commonly integrated into Laravel applications. Specifically, the LivewireFilemanagerComponent.php file lacks proper file type and MIME type validation, enabling attackers to upload malicious PHP files. These files can then be executed remotely via the /storage/ URL if the application has undergone a typical Laravel storage setup process, such as linking the storage directory to be publicly accessible. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), with publication on January 16, 2026.

The attack scenario targets unauthenticated remote attackers with network access, requiring low complexity and no privileges or user interaction. An exploiter can upload a crafted PHP file through the filemanager component, bypassing validation, and subsequently trigger execution by accessing the file via the exposed /storage/ endpoint. Successful exploitation results in remote code execution (RCE), granting high confidentiality, integrity, and availability impacts, potentially allowing full server compromise.

For mitigation details, security practitioners should review the official advisories and resources, including the Livewire Filemanager GitHub repository at https://github.com/livewire-filemanager/filemanager, a technical analysis of the unauthenticated RCE at https://hackingbydoing.wixsite.com/hackingbydoing/post/unauthenticated-rce-in-livewire-filemanager, and the CERT vulnerability note at https://www.kb.cert.org/vuls/id/650657.

Details

CWE(s)

Affected Products

livewire-filemanager
filemanager
≤ 1.0.0

CVEs Like This One

CVE-2025-49387Shared CWE-434
CVE-2025-52353Shared CWE-434
CVE-2025-25790Shared CWE-434
CVE-2025-22504Shared CWE-434
CVE-2026-33717Shared CWE-434
CVE-2025-65783Shared CWE-434
CVE-2025-44658Shared CWE-434
CVE-2026-37748Shared CWE-434
CVE-2025-50002Shared CWE-434
CVE-2026-1222Shared CWE-434

References