PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 11 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 Aug 2025 15:00:00 +0000

Type Values Removed Values Added
Description PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required.
Title PhpTax pfilez Parameter Exec Remote Code Injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-08-11T15:51:12.046Z

Reserved: 2025-08-07T19:11:33.082Z

Link: CVE-2012-10037

cve-icon Vulnrichment

Updated: 2025-08-11T15:50:40.072Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-11T15:15:27.017

Modified: 2025-08-11T18:32:48.867

Link: CVE-2012-10037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.