CVE-2019-25630
Received Received - Intake
Arbitrary File Upload in PhreeBooks Image Manager Enables RCE

Publication date: 2026-03-24

Last updated on: 2026-03-26

Assigner: VulnCheck

Description
PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Image Manager component that allows authenticated attackers to upload malicious files by submitting requests to the image upload endpoint. Attackers can upload PHP files through the imgFile parameter to the bizuno/image/manager endpoint and execute them via the bizunoFS.php script for remote code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-26
Generated
2026-05-07
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
phreesoft phreebookserp 5.2.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

PhreeBooks ERP version 5.2.3 contains an arbitrary file upload vulnerability in its Image Manager component. Authenticated attackers can exploit this by sending specially crafted requests to the image upload endpoint, specifically using the imgFile parameter to upload malicious PHP files. These uploaded PHP files can then be executed via the bizunoFS.php script, allowing remote code execution on the affected system.

The vulnerability arises because the server does not properly validate or restrict the types of files that can be uploaded, nor does it sanitize the file path, enabling attackers to upload executable code.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows an authenticated attacker to execute arbitrary PHP code on the server remotely. This means the attacker could potentially take full control of the affected system, leading to data theft, data manipulation, service disruption, or further network compromise.

Because the attack requires only authenticated access and has low complexity, it poses a significant risk to organizations using PhreeBooks ERP 5.2.3.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for suspicious POST requests to the image upload endpoint, specifically to the URL path containing `bizuno/image/manager` with the `imgFile` parameter used to upload files.'}, {'type': 'paragraph', 'content': 'One way to detect exploitation attempts is to look for HTTP POST requests with multipart/form-data encoding that include PHP files being uploaded via the `imgFile` parameter while the `imgAction` parameter is set to "upload".'}, {'type': 'paragraph', 'content': 'You can use network monitoring tools or web server logs to search for such requests.'}, {'type': 'list_item', 'content': "Using grep on web server logs to find suspicious uploads: `grep -i 'imgAction=upload' /var/log/apache2/access.log | grep -i 'imgFile=.*\\.php'`"}, {'type': 'list_item', 'content': 'Using curl to test if the endpoint accepts PHP file uploads (requires authentication):\n```\ncurl -v -F "[email protected]" -F "imgAction=upload" -b "cookie=your_auth_cookie" http://target/PhreeBooksERP/index.php?p=bizuno/image/manager\n```'}, {'type': 'paragraph', 'content': 'Additionally, checking for the presence of uploaded PHP files in the images directory or accessing URLs like `bizunoFS.php?&src=0/images/evilcode_key.php` can help confirm if the vulnerability has been exploited.'}] [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the image upload endpoint to only trusted authenticated users and implementing strict validation on uploaded files to prevent PHP or other executable files from being uploaded.

You should also monitor and audit the upload directory for any suspicious or unexpected PHP files and remove them immediately.

If possible, disable or restrict the execution of PHP files in the upload directories by configuring the web server to disallow execution in those paths.

Applying any available patches or updates from the vendor that address this vulnerability is strongly recommended.

Finally, consider enhancing authentication and session management to reduce the risk of unauthorized authenticated access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart