PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required.
Metrics
Affected Vendors & Products
References
History
Mon, 11 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 11 Aug 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required. | |
Title | PhpTax pfilez Parameter Exec Remote Code Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-11T14:54:16.517Z
Updated: 2025-08-11T15:51:12.046Z
Reserved: 2025-08-07T19:11:33.082Z
Link: CVE-2012-10037

Updated: 2025-08-11T15:50:40.072Z

Status : Awaiting Analysis
Published: 2025-08-11T15:15:27.017
Modified: 2025-08-11T18:32:48.867
Link: CVE-2012-10037

No data.