


Perceptive Security
SOC/SIEM Consultancy

ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code by invoking functions through…
Published:
21 april 2026 om 22:00:00
Alert date:
22 april 2026 om 22:11:22
Source:
nvd.nist.gov
Web Technologies
ThinkPHP version 5.0.23 contains a critical remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary PHP code through routing parameters. Attackers can craft malicious requests to the index.php endpoint with function parameters that enable system command execution with application privileges. This vulnerability poses a significant security risk as it requires no authentication and allows full code execution capabilities. The vulnerability has been documented with proof-of-concept exploits available publicly. Organizations using ThinkPHP 5.0.23 should prioritize patching or upgrading to mitigate this critical security flaw.
Technical details
Mitigation steps:
Affected products:
ThinkPHP 5.0.23
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2018-25270
https://github.com/top-think/framework/
https://thinkphp.cn
https://www.exploit-db.com/exploits/45978
https://www.vulncheck.com/advisories/thinkphp-remote-code-execution-via-invokefunction
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
