PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Image Manager component that allows authenticated attackers to upload malicious files by submitting requests to the image upload endpoint. Attackers can upload PHP files through the imgFile parameter to the bizuno/image/manager endpoint and execute them via the bizunoFS.php script for remote code execution.
References
| Link | Resource |
|---|---|
| https://sourceforge.net/projects/phreebooks/files/latest/download | Product |
| https://www.exploit-db.com/exploits/46644 | Exploit Third Party Advisory VDB Entry |
| https://www.phreesoft.com/ | Product |
| https://www.vulncheck.com/advisories/phreebooks-erp-arbitrary-file-upload-via-image-manager | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 12:16
Updated : 2026-03-26 17:16
NVD link : CVE-2019-25630
Mitre link : CVE-2019-25630
CVE.ORG link : CVE-2019-25630
JSON object : View
Products Affected
phreesoft
- phreebookserp
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
