VYPR
Critical severityNVD Advisory· Published Sep 9, 2024· Updated Sep 10, 2024

CVE-2024-44902

CVE-2024-44902

Description

A deserialization vulnerability in Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A deserialization vulnerability in ThinkPHP v6.1.3 to v8.0.4 allows unauthenticated remote code execution via the Memcached cache driver.

Vulnerability

Details

CVE-2024-44902 is a deserialization vulnerability in the ThinkPHP framework affecting versions 6.1.3 through 8.0.4. The root cause lies in unsafe handling of serialized data when the application uses the Memcached cache driver. An attacker can craft a PHP object injection payload that, upon deserialization, triggers arbitrary command execution through a chain of classes within the framework's architecture [1][2].

Exploitation

The vulnerability requires the target application to have the Memcached extension installed and enabled in the ThinkPHP cache configuration. The exploit leverages a gadget chain starting from the \think\cache\driver\Memcached class, progressing through \think\model\Pivot and \think\DbManager, ultimately achieving code execution by manipulating properties like data, withAttr, and json in the Model class. A proof-of-concept demonstrates using a public controller endpoint that calls unserialize() on user-supplied input [2].

Impact

Successful exploitation allows an unauthenticated attacker to execute arbitrary commands on the server, potentially leading to full system compromise, data exfiltration, or lateral movement within the network. The attack requires no authentication if a deserialization endpoint is exposed [1][2].

Mitigation

ThinkPHP has addressed the issue in a subsequent release; users should upgrade to a patched version beyond 8.0.4. As a workaround, disabling the Memcached driver or validating and sanitizing any deserialization input can reduce risk. The vulnerability is publicly documented with proof-of-concept code, increasing the likelihood of active exploitation [2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
topthink/frameworkPackagist
>= 6.1.3, <= 8.0.4

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.