Stopping Laravel SQL Injection with sole()
While parameterized queries are the preferred method, sole() adds an extra layer of protection when using raw queries, especially when only one record should match.
Read more [aaronsaray.com]
Posts tagged with security
While parameterized queries are the preferred method, sole() adds an extra layer of protection when using raw queries, especially when only one record should match.
Read more [aaronsaray.com]
Shawn Hooper enjoys the new presets we recently added to our Laravel CSP package.
Read more [shawnhooper.ca]
Join thousands of developers
Every two weeks, I share practical tips, tutorials, and behind-the-scenes insights from maintaining 300+ open source packages.
No spam. Unsubscribe anytime. You can also follow me on X.
A critical security vulnerability was just disclosed for Livewire v3, as Stephen Rees-Carter wrote about on Securing Laravel. The vulnerability (CVE-2025-54068) allows unauthenticated attackers to achieve remote code execution in specific scenarios. What makes this particularly concerning is that exploitation doesn't require authentication or user interaction - just a component mounted and configured in a particular way.
This vulnerability affects all Livewire v3 versions up to 3.6.3. If you're running any version in that range, attackers could potentially run arbitrary PHP code on your server. Stephan warns us the open-source nature of the fix means attackers may already be reverse-engineering the patch to identify and abuse the exploit.
Many production apps are probably running vulnerable versions right now, with their developers completely unaware. This is where automated security monitoring becomes invaluable - using Laravel Health to check for vulnerabilities, and optionally services like Oh Dear to send you notifications when issues are detected.
Our new package gives you everything you need to build a secure one-time password auth flow.
Read more [spatie.be]
I’m proud to announce that we’ve released a new package called spatie/laravel-passkeys that makes adding passkeys to a Laravel app as easy as it can be.
Read more [spatie.be]
Troy Hunt recently becaming the victim of phising. This proves yet again, that this can happen to anyone, not only non-technical people.
Read more [www.troyhunt.com]
We've been using this solution in our projects as well.
Read more [darkghosthunter.medium.com]
We just tagged & released a new major version of spatie/laravel-csp, a package to manage your Laravel app's content security policy. The development goal for version 3 was to reduce the boilerplate of configuring a policy for common services like Google Tag Manager, Fathom Analytics, Adobe Fonts…
Read more [spatie.be]
– stefanzweifel.dev - submitted by Stefan Zweifel
A new Laravel package to protect sensitive routes or actions with a confirmation-screen and ask for the two-factor authentication code of a user.
Read more [stefanzweifel.dev]
By implementing rate limiting at the edge, “dead requests” can be reduced.
Read more [james.brooks.page]
Stephen Rees-Carter tells how hardcoding admin domains in code can lead to security vulnerabilities
Read more [securinglaravel.com]
Here's how we handle secrets at Flare
Read more [flareapp.io]
– wire-elements.dev - submitted by Philo
Livewire Strict helps enforce security measures and prevents you from having unprotected sensitive public properties.
Read more [wire-elements.dev]
– ashallendesign.co.uk - submitted by Ash Allen
Read about how to encrypt queued jobs, notifications, mailables, and listeners in Laravel for improved security.
Read more [ashallendesign.co.uk]
A nice technique to prevent simple bots from harvesting your email address.
Read more [rouninmedia.github.io]
– flareapp.io - submitted by Spatie
Discover how we stopped a DDoS attack at Laracon!
Read more [flareapp.io]
– ashallendesign.co.uk - submitted by Ash Allen
Learn how to automatically hash sensitive data (such as passwords) using the "hashed" model cast in Laravel. This article also covers how to test your field is being hashed correctly.
Read more [ashallendesign.co.uk]
Recently, people started talking about a malware called “Androxgh0st” specifically targeting Laravel apps. In a recent edition of Securing Laravel, Stephen Rees-Carter wrote a good explanation of how it works. The malware targets apps with APP_DEBUG set to true. When enabled, Laravel will give…
Read more [ohdear.app]
Here's how we handle our production secrets at Flare.
Read more [flareapp.io]
Here's how my colleague Ruben managed to do this in Flare.
Read more [rubenvanassche.com]