Vulnerabilities
Vulnerable Software
Thinkphp:  >> Thinkphp  >> 5.0.24  Security Vulnerabilities
The fetch function in file thinkphp\library\think\Template.php in ThinkPHP 5.0.24 allows attackers to read arbitrary files via crafted file path in a template value.
CVSS Score
7.5
EPSS Score
0.0
Published
2025-11-20
The read function in file thinkphp\library\think\template\driver\File.php in ThinkPHP 5.0.24 contains a remote code execution vulnerability.
CVSS Score
9.8
EPSS Score
0.003
Published
2025-11-20
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.
CVSS Score
9.8
EPSS Score
0.901
Published
2022-12-23
Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell.
CVSS Score
8.8
EPSS Score
0.004
Published
2022-12-06
The package topthink/framework before 6.0.12 are vulnerable to Deserialization of Untrusted Data due to insecure unserialize method in the Driver class.
CVSS Score
7.7
EPSS Score
0.01
Published
2022-05-06
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
CVSS Score
7.5
EPSS Score
0.203
Published
2022-03-21
SQL Injection vulnerability exists in ThinkPHP5 5.0.x <=5.1.22 via the parseOrder function in Builder.php.
CVSS Score
9.8
EPSS Score
0.01
Published
2021-12-15
ThinkPHP before 5.1.23 allows SQL Injection via the public/index/index/test/index query string.
CVSS Score
9.8
EPSS Score
0.005
Published
2018-09-03


Contact Us

Shodan ® - All rights reserved