Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-6598 | PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required. |
Mon, 11 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 Aug 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PhpTax version 0.8 contains a remote code execution vulnerability in drawimage.php. The pfilez GET parameter is unsafely passed to the exec() function without sanitization. A remote attacker can inject arbitrary shell commands, leading to code execution under the web server's context. No authentication is required. | |
| Title | PhpTax pfilez Parameter Exec Remote Code Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:02:33.588Z
Reserved: 2025-08-07T19:11:33.082Z
Link: CVE-2012-10037
Updated: 2025-08-11T15:50:40.072Z
Status : Deferred
Published: 2025-08-11T15:15:27.017
Modified: 2026-04-15T00:35:42.020
Link: CVE-2012-10037
No data.
OpenCVE Enrichment
No data.
EUVD