First published: Wed Jun 29 2022(Updated: )
ThinkPHP v6.0.12 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\AbstractCache.php. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ThinkPHP ThinkPHP | =6.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-33107.
CVE-2022-33107 has a severity level of critical.
The affected software for CVE-2022-33107 is ThinkPHP v6.0.12.
Attackers can exploit CVE-2022-33107 by using a crafted payload to execute arbitrary code.
Yes, a fix is available for CVE-2022-33107. It is recommended to update to a patched version of ThinkPHP.