ThinkPHP RCE Bug: Unauthenticated Attackers Exploit Critical Flaw

ThinkPHP RCE Bug: Unauthenticated Attackers Exploit Critical Flaw

The National Vulnerability Database has detailed CVE-2018-25257, a critical remote code execution (RCE) vulnerability impacting ThinkPHP version 5.0.23. This flaw allows unauthenticated attackers to execute arbitrary PHP code by manipulating the routing parameter via the index.php endpoint. The exploit leverages the ability to invoke specific functions, enabling attackers to run system commands with the privileges of the application itself.

With a CVSS score of 9.8, this vulnerability presents a severe risk. Attackers can achieve full system compromise without needing any prior authentication or user interaction. The implications for organizations running vulnerable ThinkPHP instances are dire, potentially leading to complete data exfiltration, system takeover, or further network lateral movement.

What This Means For You

  • If your organization uses ThinkPHP 5.0.23, immediately patch or upgrade to a secure version. Audit your systems for any signs of compromise, focusing on unusual outbound network traffic or unexpected system commands executed by the web application's user.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2018-25270 - ThinkPHP RCE via Routing Parameter

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2018-25270 Vulnerability CVE-2018-25270
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 22, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

GitLab XSS Flaw: Unauthenticated JavaScript Execution Risk

CVE-2026-5816 — GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 that could have allowed...

vulnerabilityCVEhigh-severitycwe-41
/SCW Vulnerability Desk /HIGH /8 /⚑ 3 IOCs /⚙ 2 Sigma

GitLab Vulnerability Exposes Sensitive Tokens in Storybook

CVE-2026-5262 — GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.1.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 that...

vulnerabilityCVEhigh-severitycwe-79
/SCW Vulnerability Desk /HIGH /8 /⚑ 1 IOC /⚙ 2 Sigma

GitLab CSRF Flaw Exposes Authenticated Users to Unauthenticated Attacks

CVE-2026-4922 — GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 that...

vulnerabilityCVEhigh-severitycwe-352
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 1 IOC /⚙ 2 Sigma