CVE ReportsMagic Tricks or Dark Arts? RCE in Laravel MagicLink Vulnerability ID:...
Vulnerability ID: GHSA-R33W-FG8J-9C94
CVSS Score: 8.8
Published: 2026-02-12
A critical insecure deserialization vulnerability in cesargb/laravel-magiclink allows attackers with database write access to execute arbitrary code. The package, designed to create passwordless login links, stored serialized PHP objects directly in the database without integrity checks. This flaw turns a standard SQL Injection or low-privileged database access into a full Remote Code Execution (RCE) event.
The cesargb/laravel-magiclink package (< 2.25.1) trusts the database too much. It stores serialized PHP actions in the magic_links table and unserializes them when a user clicks the link. If an attacker can modify this table (via SQLi or compromised credentials), they can inject a malicious PHP object (gadget chain) that executes code upon deserialization. The fix involves HMAC signing to ensure data integrity.
2.25.1)unserialize() on database columns.Remediation Steps:
composer update cesargb/laravel-magiclink.InvalidSignatureException which may indicate attempted exploitation.Read the full report for GHSA-R33W-FG8J-9C94 on our website for more details including interactive diagrams and full exploit analysis.