top of page
perceptive_background_267k.jpg

ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code by invoking functions through…

Published:

21 April 2026 at 22:00:00

Alert date:

22 April 2026 at 22:11:22

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

ThinkPHP version 5.0.23 contains a critical remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code through routing parameters. Attackers can craft malicious requests to the index.php endpoint with function parameters that enable system command execution with application privileges. This vulnerability poses a significant security risk as it requires no authentication and allows full code execution capabilities. The vulnerability has been documented with proof-of-concept exploits available publicly. Organizations using ThinkPHP 5.0.23 should prioritize patching or upgrading to mitigate this critical security flaw.

Technical details

Mitigation steps:

Affected products:

ThinkPHP 5.0.23

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page