ThinkPHP 5.1.25 has SQL Injection via the count parameter because the library/think/db/Query.php aggregate function mishandles the aggregate variable. NOTE: a backquote character is required in the attack URI.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-3081 | ThinkPHP 5.1.25 has SQL Injection via the count parameter because the library/think/db/Query.php aggregate function mishandles the aggregate variable. NOTE: a backquote character is required in the attack URI. |
![]() |
GHSA-7xfj-4jpg-58vf | ThinkPHP SQLi Vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T00:35:42.077Z
Reserved: 2018-10-19T00:00:00Z
Link: CVE-2018-18530

No data.

Status : Modified
Published: 2018-10-19T20:29:00.490
Modified: 2024-11-21T03:56:06.337
Link: CVE-2018-18530

No data.

No data.