Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48112: n/a

0
Critical
VulnerabilityCVE-2024-48112cvecve-2024-48112
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A deserialization vulnerability in the component \controller\Index.php of Thinkphp v6.1.3 to v8.0.4 allows attackers to execute arbitrary code.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:37:37 UTC

Technical Analysis

CVE-2024-48112 is a critical security vulnerability identified in the ThinkPHP framework, specifically within the \controller\Index.php component, affecting versions 6.1.3 through 8.0.4. The flaw arises from unsafe deserialization of untrusted data, a common security weakness categorized under CWE-502. Deserialization vulnerabilities occur when an application deserializes data from untrusted sources without sufficient validation or sanitization, allowing attackers to craft malicious serialized objects that, when deserialized, execute arbitrary code on the server. In this case, the vulnerability enables remote code execution (RCE) without requiring authentication or user interaction, making it highly exploitable over the network. The CVSS 3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the severity and ease of exploitation mean attackers could quickly develop and deploy exploits. ThinkPHP is a popular PHP framework widely used in web applications, especially in China and other Asian markets, increasing the potential attack surface. The vulnerability's presence in a core controller component suggests that many applications using affected versions are vulnerable. This flaw could lead to complete system compromise, data theft, service disruption, or use of the compromised server as a pivot point for further attacks. The lack of available patches at the time of disclosure necessitates immediate defensive measures to reduce risk.

Potential Impact

The impact of CVE-2024-48112 is severe and multifaceted. Successful exploitation allows unauthenticated remote attackers to execute arbitrary code on vulnerable servers, potentially leading to full system compromise. This jeopardizes the confidentiality of sensitive data, including user information and intellectual property, as attackers can access or exfiltrate data. Integrity is compromised as attackers can modify or delete data, inject malicious code, or alter application behavior. Availability is also at risk since attackers could disrupt services by deleting files, corrupting databases, or deploying ransomware. Organizations relying on ThinkPHP for web applications face risks of website defacement, data breaches, and lateral movement within their networks. The vulnerability's network-exploitable nature and lack of authentication requirements increase the likelihood of automated scanning and exploitation attempts. This could result in widespread attacks, especially targeting organizations that delay patching or mitigation. The potential for attackers to establish persistent backdoors or use compromised servers for launching further attacks amplifies the threat. Overall, the vulnerability poses a critical risk to organizations’ operational continuity, reputation, and regulatory compliance.

Mitigation Recommendations

To mitigate CVE-2024-48112, organizations should take the following specific actions: 1) Immediately identify and inventory all instances of ThinkPHP versions 6.1.3 through 8.0.4 in their environment. 2) Monitor official ThinkPHP channels for patches or security updates addressing this vulnerability and apply them as soon as they become available. 3) In the absence of patches, implement temporary mitigations such as disabling or restricting deserialization functionality in the \controller\Index.php component or related code paths. 4) Employ web application firewalls (WAFs) with updated rules to detect and block malicious serialized payloads targeting this vulnerability. 5) Conduct thorough code reviews to identify unsafe deserialization practices and refactor code to use safe serialization libraries or implement strict input validation and sanitization. 6) Restrict network access to vulnerable applications by limiting exposure to trusted IPs or internal networks where feasible. 7) Enable comprehensive logging and monitoring to detect suspicious activities indicative of exploitation attempts. 8) Educate development and security teams about the risks of unsafe deserialization and secure coding practices to prevent similar vulnerabilities. 9) Consider deploying runtime application self-protection (RASP) solutions to detect and prevent exploitation in real time. 10) Prepare incident response plans to quickly contain and remediate any successful attacks leveraging this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d0bb7ef31ef0b56d72d

Added to database: 2/25/2026, 9:43:39 PM

Last enriched: 2/28/2026, 7:37:37 AM

Last updated: 4/12/2026, 2:03:43 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses