CVE-2013-10070 PUBLISHED

PHP-Charts v1.0 PHP Code Execution

Assigner: VulnCheck
Reserved: 05.08.2025 Published: 05.08.2025 Updated: 07.08.2025

PHP-Charts v1.0 contains a PHP code execution vulnerability in wizard/url.php, where user-supplied GET parameter names are passed directly to eval() without sanitization. A remote attacker can exploit this flaw by crafting a request that injects arbitrary PHP code, resulting in command execution under the web server's context. The vulnerability allows unauthenticated attackers to execute system-level commands via base64-encoded payloads embedded in parameter names, leading to full compromise of the host system.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 10

Product Status

Vendor PHP-Charts
Product PHP-Charts
Versions Default: unknown
  • Version 1.0 is affected

Credits

  • AkaStep finder

References

Problem Types

  • CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') CWE

Impacts

  • CAPEC-242 Code Injection