CVE-2019-25647

PhreeBooks ERP 5.2.3 contains a remote code execution vulnerability in the image manager that allows authenticated attackers to upload and execute arbitrary PHP files by bypassing file extension controls. Attackers can upload malicious PHP files through the image manager endpoint and execute them to establish reverse shell connections and execute system commands.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phreesoft:phreebookserp:5.2.3:*:*:*:*:*:*:*

History

25 Mar 2026, 21:43

Type Values Removed Values Added
References () https://sourceforge.net/projects/phreebooks/ - () https://sourceforge.net/projects/phreebooks/ - Product
References () https://www.exploit-db.com/exploits/46645 - () https://www.exploit-db.com/exploits/46645 - Exploit, Third Party Advisory, VDB Entry
References () https://www.phreesoft.com/ - () https://www.phreesoft.com/ - Product
References () https://www.vulncheck.com/advisories/phreebooks-erp-remote-code-execution-via-image-manager - () https://www.vulncheck.com/advisories/phreebooks-erp-remote-code-execution-via-image-manager - Third Party Advisory
First Time Phreesoft
Phreesoft phreebookserp
CPE cpe:2.3:a:phreesoft:phreebookserp:5.2.3:*:*:*:*:*:*:*

24 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 12:16

Updated : 2026-03-25 21:43


NVD link : CVE-2019-25647

Mitre link : CVE-2019-25647

CVE.ORG link : CVE-2019-25647


JSON object : View

Products Affected

phreesoft

  • phreebookserp
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type