PT-2022-28094 · Unknown · Thinkphp Framework

1Nhann

·

Published

2022-12-23

·

Updated

2025-10-30

·

CVE-2022-47945

CVSS v3.1
9.8
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions ThinkPHP Framework versions prior to 6.0.14
Description The issue allows local file inclusion via the
lang
parameter when the language pack feature is enabled (
lang switch on=true
). An unauthenticated and remote attacker can exploit this to execute arbitrary operating system commands, as demonstrated by including
pearcmd.php
. Over 572 IPs have launched attacks, with exploitation attempts spiking recently.
Recommendations For ThinkPHP Framework versions prior to 6.0.14, consider disabling the language pack feature by setting
lang switch on=false
until a patch is available. Restrict access to the
lang
parameter to minimize the risk of exploitation.

Exploit

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2022-47945
GHSA-P4QR-VQ2G-22WP

Affected Products

Thinkphp Framework