{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2019-25630","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-03-24T11:01:20.165Z","datePublished":"2026-03-24T11:27:04.730Z","dateUpdated":"2026-03-26T16:15:53.724Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-26T16:15:53.724Z"},"title":"PhreeBooks ERP 5.2.3 Arbitrary File Upload via Image Manager","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-434","description":"CWE-434 Unrestricted upload of file with dangerous type","type":"CWE"}]}],"affected":[{"vendor":"Phreesoft","product":"PhreeBooks ERP","versions":[{"status":"affected","version":"5.2.3"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Image Manager component that allows authenticated attackers to upload malicious files by submitting requests to the image upload endpoint. Attackers can upload PHP files through the imgFile parameter to the bizuno/image/manager endpoint and execute them via the bizunoFS.php script for remote code execution.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Image Manager component that allows authenticated attackers to upload malicious files by submitting requests to the image upload endpoint. Attackers can upload PHP files through the imgFile parameter to the bizuno/image/manager endpoint and execute them via the bizunoFS.php script for remote code execution.</p>"}]}],"references":[{"url":"https://www.exploit-db.com/exploits/46644","name":"ExploitDB-46644","tags":["exploit"]},{"url":"https://www.phreesoft.com/","name":"Official Product Homepage","tags":["product"]},{"url":"https://sourceforge.net/projects/phreebooks/files/latest/download","name":"Product Reference","tags":["product"]},{"url":"https://www.vulncheck.com/advisories/phreebooks-erp-arbitrary-file-upload-via-image-manager","name":"VulnCheck Advisory: PhreeBooks ERP 5.2.3 Arbitrary File Upload via Image Manager","tags":["third-party-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}}],"credits":[{"lang":"en","value":"Abdullah Çelebi","type":"finder"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"vulncheck"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T17:53:13.941891Z","id":"CVE-2019-25630","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T17:53:20.707Z"}}]}}