CVE-2018-20062
CRITICAL KEV NUCLEINoneCms V1.3 - RCE
Title source: llmDescription
An issue was discovered in NoneCms V1.3. thinkphp/library/think/App.php allows remote attackers to execute arbitrary PHP code via crafted use of the filter parameter, as demonstrated by the s=index/\think\Request/input&filter=phpinfo&data=1 query string.
Exploits (5)
metasploit
WORKING POC
EXCELLENT
by wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/thinkphp_rce.rb
Nuclei Templates (1)
ThinkPHP 5.0.23 - Remote Code Execution
CRITICALVERIFIEDby dr_set
FOFA:
app="ThinkPHP"
References (3)
Scores
CVSS v3
9.8
EPSS
0.9431
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
CISA KEV
2021-11-03
VulnCheck KEV
2019-06-12
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2018-12637
Classification
Status
published
Affected Products (1)
5none/nonecms
Timeline
Published
Dec 11, 2018
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026