top of page
perceptive_background_267k.jpg

ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code by invoking functions through…

Published:

21 April 2026 at 22:00:00

Alert date:

22 April 2026 at 17:03:04

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies

ThinkPHP 5.0.23 contains a critical remote code execution vulnerability (CVE-2018-25270) that allows unauthenticated attackers to execute arbitrary PHP code through routing parameters. Attackers can craft malicious requests to the index.php endpoint with function parameters to execute system commands with application privileges. The vulnerability affects the popular ThinkPHP framework and provides complete system access to unauthorized users. This represents a severe security risk for applications built on the affected ThinkPHP version. The vulnerability has been documented with proof-of-concept exploits available publicly.

Technical details

Mitigation steps:

Affected products:

ThinkPHP 5.0.23

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page