CVE-2018-25270

9.8 CRITICAL
Published: April 22, 2026 Modified: April 27, 2026
View on NVD

Description

ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code by invoking functions through the routing parameter. Attackers can craft requests to the index.php endpoint with malicious function parameters to execute system commands with application privileges.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/top-think/framework/
Source: disclosure@vulncheck.com
Product
https://thinkphp.cn
Source: disclosure@vulncheck.com
Broken Link
https://www.exploit-db.com/exploits/45978
Source: disclosure@vulncheck.com
Exploit Third Party Advisory VDB Entry

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.9%
76th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

thinkphp