CVE-2020-25540

HIGH EXPLOITED NUCLEI

Thinkadmin - Path Traversal

Title source: rule

Description

ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.

Exploits (5)

exploitdb WORKING POC
by Hzllaga · textwebappsphp
https://www.exploit-db.com/exploits/48812
nomisec WORKING POC 7 stars
by Schira4396 · remote
https://github.com/Schira4396/CVE-2020-25540
nomisec WORKING POC 1 stars
by RajChowdhury240 · poc
https://github.com/RajChowdhury240/ThinkAdmin-CVE-2020-25540
nomisec WORKING POC
by simonlee-hello · infoleak
https://github.com/simonlee-hello/CVE-2020-25540
nomisec WORKING POC
by lowkey0808 · remote
https://github.com/lowkey0808/cve-2020-25540

Nuclei Templates (1)

ThinkAdmin 6 - Local File Inclusion
HIGHby geeknik

Scores

CVSS v3 7.5
EPSS 0.9377
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2024-07-21
CWE
CWE-22
Status published
Products (2)
thinkadmin/thinkadmin 6.0
zoujingli/thinkadmin Packagist
Published Sep 14, 2020
Tracked Since Feb 18, 2026