First published: Wed Feb 08 2023(Updated: )
thinkphp 6.0.0~6.0.13 and 6.1.0~6.1.1 contains a deserialization vulnerability. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ThinkPHP ThinkPHP | >=6.0.0<=6.0.13 | |
ThinkPHP ThinkPHP | =6.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-45982.
The severity of CVE-2022-45982 is critical.
thinkphp versions 6.0.0 to 6.0.13 and 6.1.0 to 6.1.1 are affected by CVE-2022-45982.
The deserialization vulnerability in thinkphp allows attackers to execute arbitrary code by sending a crafted payload.
Yes, upgrading to a fixed version of thinkphp will fix the vulnerability.