Description
An arbitrary file upload vulnerability in the component /admin/api.upload/file of ThinkAdmin v6.1.53 allows attackers to execute arbitrary code via a crafted Zip file.
References (1)
Core 1
Core References
Exploit, Third Party Advisory
https://github.com/1dreamGN/CVE/blob/main/ThinkAdmin%20directory%20traversal%2Bfile%20upload%20getshell.md
Scores
CVSS v3
8.8
EPSS
0.0020
EPSS Percentile
41.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (2)
thinkadmin/thinkadmin
6.1.53
zoujingli/thinkadmin
0Packagist
Published
Dec 04, 2023
Tracked Since
Feb 18, 2026