Description
PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-6598 | PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required. |
References
History
Mon, 11 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 Aug 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required. | |
| Title | PhpTax pfilez Parameter Exec Remote Code Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:02:33.588Z
Reserved: 2025-08-07T19:11:33.082Z
Link: CVE-2012-10037
Updated: 2025-08-11T15:50:40.072Z
Status : Deferred
Published: 2025-08-11T15:15:27.017
Modified: 2026-04-15T00:35:42.020
Link: CVE-2012-10037
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD