Description
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-p4qr-vq2g-22wp | ThinkPHP Framework vulnerable to remote code execution |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 16 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-15T13:52:17.194Z
Reserved: 2022-12-23T00:00:00.000Z
Link: CVE-2022-47945
Updated: 2024-08-03T15:02:36.570Z
Status : Modified
Published: 2022-12-23T21:15:09.203
Modified: 2025-04-15T14:15:39.940
Link: CVE-2022-47945
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA