On March 22, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added three vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, confirming they are under active exploitation by threat actors. The additions mandate that Federal Civilian Executive Branch (FCEB) agencies patch these flaws by April 12, 2026. The vulnerabilities affect a diverse range of popular products: Apple visionOS, the Laravel Framework, and Craft CMS. The flaws include an arbitrary code execution bug in Apple's new spatial computing platform, a remote code execution vulnerability in a widely-used PHP framework, and a privilege escalation flaw in a popular content management system. CISA's directive underscores the immediate risk these vulnerabilities pose, and all public and private sector organizations are strongly advised to prioritize applying the necessary security updates to mitigate active threats.
The three vulnerabilities added to the KEV catalog represent distinct threats to different parts of the technology stack.
CVE-2018-15133) and can lead to remote code execution. Exploitation is possible if the application's unique APP_KEY is exposed, a condition that can occur through misconfiguration or information disclosure vulnerabilities.By definition, all three vulnerabilities are being actively exploited in the wild. CISA adds vulnerabilities to the KEV catalog only when there is reliable evidence of active exploitation. The specific threat actors or campaigns leveraging these flaws were not detailed in the CISA alert, but their inclusion serves as a definitive warning of their real-world risk.
The impact varies by vulnerability but is significant in each case:
.env files or exploit deserialization. For CVE-2026-25487, look for unusual GET requests containing script tags or other XSS payloads, particularly those targeting administrative endpoints.Remediation for all three vulnerabilities involves applying the latest security updates provided by the respective vendors.
APP_KEY is not exposed and rotate the key if there is any suspicion of compromise.Applying vendor patches is the primary mitigation for all three vulnerabilities.
Using a Web Application Firewall (WAF) can help block exploit attempts against the Laravel and Craft CMS vulnerabilities.
The inclusion of these vulnerabilities in the CISA KEV catalog mandates immediate action. The most effective countermeasure is to apply the security updates provided by the vendors. For CVE-2026-28217, Apple Vision Pro devices must be updated to the latest visionOS. For CVE-2024-4671, Laravel applications must be updated, and critically, their configuration must be audited to ensure the APP_KEY is not exposed. For CVE-2026-25487, Craft CMS installations must be upgraded to a patched version. Organizations should use automated patch management and software composition analysis (SCA) tools to identify all affected instances and deploy updates systematically. Given these are actively exploited, patching should be treated as an emergency and completed well before the CISA deadline of April 12, 2026.
For the web-facing vulnerabilities (CVE-2024-4671 in Laravel and CVE-2026-25487 in Craft CMS), a Web Application Firewall (WAF) can serve as a vital defense-in-depth layer. Configure your WAF with rules to detect and block common attack patterns associated with these flaws. For the Craft CMS XSS flaw, this includes filtering for malicious JavaScript in URL parameters targeting admin pages. For the Laravel RCE, this includes blocking requests attempting to read .env files or carrying serialized PHP object payloads. While WAFs are not a substitute for patching, they can provide 'virtual patching' that protects systems while the official update is being tested and deployed, and can help defend against zero-day variants of these attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats