VYPR
High severityNVD Advisory· Published Feb 10, 2022· Updated Aug 4, 2024

CVE-2021-44892

CVE-2021-44892

Description

A Remote Code Execution (RCE) vulnerability exists in ThinkPHP 3.x.x via value[_filename] in index.php, which could let a malicious user obtain server control privileges.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ThinkPHP 3.x.x allows unauthenticated remote code execution via the value[_filename] parameter in index.php.

Vulnerability

A Remote Code Execution (RCE) vulnerability exists in ThinkPHP versions 3.x.x. The flaw is located in index.php and is triggered through the value[_filename] parameter. No specific configuration is required for the vulnerable code path to be reachable, as the parameter is processed in a default installation [1].

Exploitation

An attacker can exploit this vulnerability remotely without prior authentication. By crafting a malicious HTTP request that includes the value[_filename] parameter with arbitrary file content or a payload, the attacker can execute arbitrary commands on the server. The attack requires no user interaction or special network position beyond network access to the target [1].

Impact

Successful exploitation allows an attacker to execute arbitrary code on the server, potentially gaining full control over the affected system. This is a Critical severity vulnerability with a CVSS v3.1 score of 9.8, indicating a compromise of confidentiality, integrity, and availability [1]. The attacker can achieve remote code execution with full privileges [1].

Mitigation

As of the publication date (2022-02-10), no patch or fixed version has been released by the vendor for the affected ThinkPHP 3.x.x branch. The project has since moved to ThinkPHP 8.x, and version 3.x.x is considered end-of-life (EOL) [2]. Users are strongly advised to upgrade to a supported version of ThinkPHP (e.g., 6.x, 8.x) as no workaround is available [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
topthink/frameworkPackagist
<= 3.2.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.