VYPR
High severityNVD Advisory· Published Mar 20, 2022· Updated Aug 3, 2024

CVE-2022-25481

CVE-2022-25481

Description

ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ThinkPHP 5.0.24 default configuration leaks system environment variables via index.php when PATHINFO is not set.

Vulnerability

ThinkPHP Framework v5.0.24, when deployed without the PATHINFO parameter configured, exposes system environment parameters through the index.php entry point. The vulnerability arises because the framework's default routing mechanism processes a request such as http://serverName/index.php?s=example and, if no matching module is found, outputs debugging-style information including server/request data and ThinkPHP constants. The issue affects version 5.0.24 specifically, as noted in the CVE description and the related researcher's disclosure [1][3].

Exploitation

An attacker needs only network access to the affected ThinkPHP application. No authentication or special privileges are required. By sending a crafted GET request to index.php with an unknown module via the s parameter (e.g., GET /index.php?s=example HTTP/1.1), the server responds with detailed system environment information. The attack does not require any user interaction or prior knowledge beyond the server's base URL [3].

Impact

Successful exploitation leads to information disclosure of sensitive system environment parameters, such as server paths, database credentials, and other configuration values that would normally be hidden in production. While the vulnerability does not directly enable remote code execution or file modification, the leaked data can significantly aid an attacker in further compromising the application or its underlying infrastructure [1][3].

Mitigation

No official patch has been released for this issue, and the disclosure is disputed by a third party who notes that environment exposure is an intended feature of debugging mode. Administrators should ensure ThinkPHP is not run in debug mode on production systems, explicitly configure PATHINFO settings, or apply input filtering to the s parameter. As of the publication date (2022-03-20), no fixed version was available, and the vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog [1][2][3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
topthink/frameworkPackagist
<= 5.0.24

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.