PHP-Charts v1.0 contains a PHP code execution vulnerability in wizard/url.php, where user-supplied GET parameter names are passed directly to eval() without sanitization. A remote attacker can exploit this flaw by crafting a request that injects arbitrary PHP code, resulting in command execution under the web server's context. The vulnerability allows unauthenticated attackers to execute system-level commands via base64-encoded payloads embedded in parameter names, leading to full compromise of the host system.
CVSS
No CVSS.
References
Configurations
No configuration.
History
07 Aug 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/php_charts_exec.rb - | |
References | () https://www.exploit-db.com/exploits/24201 - | |
References | () https://www.exploit-db.com/exploits/24273 - | |
Summary |
|
05 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-05 20:15
Updated : 2025-08-07 16:15
NVD link : CVE-2013-10070
Mitre link : CVE-2013-10070
CVE.ORG link : CVE-2013-10070
JSON object : View
Products Affected
No product.
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')