CVE-2025-50706
Published: 05 August 2025
Summary
CVE-2025-50706 is a critical-severity Code Injection (CWE-94) vulnerability in Thinkphp Thinkphp. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SA-22 (Unsupported System Components) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation directly addresses the code injection vulnerability in ThinkPHP 5.1's routecheck function by applying patches or upgrades to prevent arbitrary code execution.
Information input validation checks and sanitizes inputs to the routecheck function, blocking malicious code injection attempts by remote attackers.
Prohibiting unsupported system components like ThinkPHP 5.1 prevents deployment and use of software known to contain critical code injection vulnerabilities.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated RCE via code injection in public-facing ThinkPHP web app maps cleanly to exploitation of internet-facing software for initial access and arbitrary execution.
NVD Description
An issue in thinkphp v.5.1 allows a remote attacker to execute arbitrary code via the routecheck function
Deeper analysisAI
CVE-2025-50706 is a code injection vulnerability (CWE-94) in ThinkPHP version 5.1, enabling a remote attacker to execute arbitrary code through the routecheck function. Published on 2025-08-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for complete system compromise.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows attackers to achieve high-impact effects on confidentiality, integrity, and availability, including full arbitrary code execution on the targeted ThinkPHP 5.1 instance.
Advisories referenced in the CVE include details on ThinkPHP 5.1 file inclusion issues under CNVD-2024-29981, with analysis available at https://xinyisleep.github.io/2024-04-24/Thinkphp5.1%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-29981, https://xinyisleep.github.io/CVE-2025-50706.md, and a duplicate of the first URL; these provide vulnerability breakdowns but no specific patch or mitigation guidance is detailed in the CVE inputs.
Details
- CWE(s)