Browse all 4 CVE security advisories affecting filamentphp. AI-powered Chinese analysis, POCs, and references for each vulnerability.
FilamentPHP is an admin panel framework for Laravel applications, streamlining backend development. Historically, it has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, primarily stemming from improper input validation and access control flaws. The framework's modular architecture introduces potential attack surfaces through its customizable components. While no major public security incidents have been widely reported, the four documented CVEs highlight ongoing security challenges in its default configurations and third-party extensions. Developers should implement strict input sanitization and access controls when deploying FilamentPHP to mitigate these risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-33080 | Filament: Unvalidated Range and Values summarizer values can be used for XSS — filamentCWE-79 | 7.3 | High | 2026-03-20 |
| CVE-2025-67507 | Filament's multi-factor authentication (app) recovery codes can be used multiple times — filamentCWE-287 | 8.1 | High | 2025-12-10 |
| CVE-2024-51758 | Exported files stored in default (`public`) filesystem if not reconfigured in filament — filamentCWE-1188 | 7.1AI | HighAI | 2024-11-07 |
| CVE-2024-47186 | Filament has unvalidated ColorColumn and ColorEntry values that can be used for Cross-site Scripting — filamentCWE-79 | 6.1 | Medium | 2024-09-27 |
This page lists every published CVE security advisory associated with filamentphp. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.