Vulnerability Description
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thinkphp | Thinkphp | 5.0.24 |
Related Weaknesses (CWE)
References
- https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.mdExploitThird Party Advisory
- https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.mdExploitThird Party Advisory
FAQ
What is CVE-2022-25481?
CVE-2022-25481 is a vulnerability with a CVSS score of 7.5 (HIGH). ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a...
How severe is CVE-2022-25481?
CVE-2022-25481 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25481?
Check the references section above for vendor advisories and patch information. Affected products include: Thinkphp Thinkphp.