CVE-2025-50707
ThinkPHP vulnerability analysis and mitigation

Overview

An issue in thinkphp3 v.3.2.5 allows a remote attacker to execute arbitrary code via the index.php component. The vulnerability was discovered and disclosed on August 5, 2025, affecting ThinkPHP framework version 3.2.5 and below (MITRE, XinYiSec).

Technical details

The vulnerability is a Local File Inclusion (LFI) issue that exists in the routing mechanism of ThinkPHP3. The flaw allows attackers to manipulate the 'a' parameter in URLs to include arbitrary HTML files containing PHP code. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high severity across confidentiality, integrity, and availability impacts (MITRE).

Impact

The vulnerability allows remote attackers to execute arbitrary code on affected systems by including malicious HTML files through the index.php component. This could lead to complete system compromise, as successful exploitation provides attackers with the ability to execute code with the privileges of the web server process (XinYiSec).

Mitigation and workarounds

As ThinkPHP3 is no longer maintained, the primary recommendation is to upgrade to a supported version of the framework. For systems that cannot be immediately upgraded, it is recommended to implement strict input validation and access controls for the affected parameters (XinYiSec).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management