CVE-2019-25647
HIGH WAF: Medium
CVSS 8.8
Published: 2026-03-24
CWE-434
PhreeBooks ERP 5.2.3 contains a remote code execution vulnerability in the image manager that allows authenticated attackers to upload and execute arbitrary PHP files by bypassing file extension controls. Attackers can upload malicious PHP files through the image manager endpoint and execute them to establish reverse shell connections and execute system commands.
WAF Coverage Analysis
Unrestricted File Upload
Medium WAF Coverage
OWASP: A04:2021 Insecure Design
930xxx - Local File Inclusion
Affected Software
| Vendor | Product | Version |
|---|---|---|
| phreesoft | phreebookserp | 5.2.3 |
References
- sourceforge.net (Product)
- www.exploit-db.com (Exploit, Third Party Advisory, VDB Entry)
- www.phreesoft.com (Product)
- www.vulncheck.com (Third Party Advisory)