CVE-2019-9082
HIGH KEV NUCLEIThinkphp < 3.2.4 - Missing Authentication
Title source: ruleDescription
ThinkPHP before 3.2.4, as used in Open Source BMS v1.1.1 and other products, allows Remote Command Execution via public//?s=index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]= followed by the command.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/48333
Nuclei Templates (1)
ThinkPHP < 3.2.4 - Remote Code Execution
HIGHVERIFIEDby 0xanis
FOFA:
app="ThinkPHP"
References (4)
Scores
CVSS v3
8.8
EPSS
0.9425
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2019-01-13
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2019-18467
CWE
CWE-306
CWE-94
Status
published
Products (3)
opensourcebms/open_source_background_management_system
1.1.1
thinkphp/thinkphp
< 3.2.4
zzzcms/zzzphp
1.6.1
Published
Feb 24, 2019
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026