PhreeBooks ERP 5.2.3 contains a remote code execution vulnerability in the image manager that allows authenticated attackers to upload and execute arbitrary PHP files by bypassing file extension controls. Attackers can upload malicious PHP files through the image manager endpoint and execute them to establish reverse shell connections and execute system commands.
References
| Link | Resource |
|---|---|
| https://sourceforge.net/projects/phreebooks/ | Product |
| https://www.exploit-db.com/exploits/46645 | Exploit Third Party Advisory VDB Entry |
| https://www.phreesoft.com/ | Product |
| https://www.vulncheck.com/advisories/phreebooks-erp-remote-code-execution-via-image-manager | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-24 12:16
Updated : 2026-03-25 21:43
NVD link : CVE-2019-25647
Mitre link : CVE-2019-25647
CVE.ORG link : CVE-2019-25647
JSON object : View
Products Affected
phreesoft
- phreebookserp
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
