
Cloud Vulnerability DB
A community-led vulnerabilities database
ThinkPHP versions 6.0.0 through 6.0.13 and 6.1.0 through 6.1.1 contain a critical deserialization vulnerability that allows attackers to execute arbitrary code via crafted payloads (NVD). The vulnerability was disclosed on February 8, 2023, and received a CVSS v3.1 base score of 9.8 CRITICAL.
The vulnerability is classified as CWE-502 (Deserialization of Untrusted Data) and affects the core functionality of ThinkPHP. The critical CVSS score of 9.8 is based on the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, no privileges required, and no user interaction needed for exploitation (NVD).
The vulnerability allows attackers to execute arbitrary code on affected systems, potentially leading to complete system compromise. Due to the critical nature of the vulnerability and its ease of exploitation, affected systems are at risk of unauthorized access, data breach, and system takeover (NVD).
Users should upgrade to ThinkPHP versions after 6.0.13 for the 6.0.x branch or after 6.1.1 for the 6.1.x branch to address this vulnerability. If immediate upgrading is not possible, it is recommended to implement additional security controls to restrict access to affected components (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."