CVE-2018-17566: ThinkPHP SQL injection vulnerability
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49734%
CWE
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
topthink/framework | composer | = 5.1.24 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description explicitly mentions the 'delete' function being vulnerable when WHERE condition values are user-controlled. In ThinkPHP's architecture, database operations like DELETE are handled by the Query
class. The CWE-89 classification confirms this is an SQL injection flaw caused by improper input sanitization. The GitHub issue (#858) and advisory both focus on the delete
method's unsafe handling of user input in WHERE clauses, making think\db\Query::delete
the clear entry point for exploitation.