


Perceptive Security
SOC/SIEM Consultancy

ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code by invoking functions through…
Published:
21 April 2026 at 22:00:00
Alert date:
22 April 2026 at 17:03:04
Source:
nvd.nist.gov
Web Technologies
ThinkPHP 5.0.23 contains a critical remote code execution vulnerability (CVE-2018-25270) that allows unauthenticated attackers to execute arbitrary PHP code through routing parameters. Attackers can craft malicious requests to the index.php endpoint with function parameters to execute system commands with application privileges. The vulnerability affects the popular ThinkPHP framework and provides complete system access to unauthorized users. This represents a severe security risk for applications built on the affected ThinkPHP version. The vulnerability has been documented with proof-of-concept exploits available publicly.
Technical details
Mitigation steps:
Affected products:
ThinkPHP 5.0.23
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2018-25270
https://github.com/top-think/framework/
https://thinkphp.cn
https://www.exploit-db.com/exploits/45978
https://www.vulncheck.com/advisories/thinkphp-remote-code-execution-via-invokefunction
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
