Authentication Bypass Using an Alternate Path or Channel Affecting filament/filament package, versions >=4.0.0, <4.3.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-FILAMENTFILAMENT-14287358
  • published10 Dec 2025
  • disclosed10 Dec 2025
  • creditJasper Zonneveld

Introduced: 10 Dec 2025

CVE-2025-67507  (opens in a new tab)
CWE-288  (opens in a new tab)

How to fix?

Upgrade filament/filament to version 4.3.1 or higher.

Overview

filament/filament is an A collection of full-stack components for accelerated Laravel app development.

Affected versions of this package are vulnerable to Authentication Bypass Using an Alternate Path or Channel due to the handling of recovery codes for app-based multi-factor authentication. An attacker can gain unauthorized access by reusing the same recovery code multiple times.

Note: This is only exploitable if app-based multi-factor authentication is enabled and recovery codes are in use, and the attacker is in possession of the user's credentials and recovery codes.

References

CVSS Base Scores

version 4.0
version 3.1