Skip to content
Nullcon Berlin

Remote Command Execution Through Unmarshalling


Course

Pierre Martin and Rémi Matasse of Synacktiv explain how Livewire's unmarshalling logic can be weaponized into stealthy remote command execution when Laravel app keys are exposed.

Laravel Livewire simplifies state synchronization between front-end and back-end components, but its hydration and unmarshalling mechanisms introduce high-risk attack surfaces when cryptographic trust boundaries erode. By abusing object instantiation paths and PHP magic methods, attackers can chain overlooked framework gadgets into reliable remote command execution.

This research demonstrates how default framework behavior, combined with leaked or reused application keys, enables stealth exploitation that bypasses integrity checks and logging. It also shows how these chains can be automated at scale, transforming a theoretical weakness into a practical offensive capability while exposing systemic risks in modern PHP application design.

In this session, Synacktiv's Pentesters and Researchers Pierre Martin and Rémi Matasse will discuss:

  • How Livewire hydration enables unsafe object instantiation;
  • Automating exploitation using cryptographic checksum abuse;
  • Operational risks of leaked or default Laravel app keys.

 

Here is the course outline:

Livewire: Remote Command Execution Through Unmarshalling

Floating Button