CVE-2022-47945
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
23/12/2022
Last modified:
15/04/2025
Description
ThinkPHP Framework before 6.0.14 allows local file inclusion via the lang parameter when the language pack feature is enabled (lang_switch_on=true). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including pearcmd.php.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:* | 6.0.14 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099
- https://github.com/top-think/framework/compare/v6.0.13...v6.0.14
- https://tttang.com/archive/1865/
- https://github.com/top-think/framework/commit/c4acb8b4001b98a0078eda25840d33e295a7f099
- https://github.com/top-think/framework/compare/v6.0.13...v6.0.14
- https://tttang.com/archive/1865/



