PhreeBooks 5.2.3 contains an authenticated file upload vulnerability in the Image Manager that allows remote code execution. Attackers can upload a malicious PHP web shell by exploiting unrestricted file type uploads to gain command execution on the server.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 23 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description PhreeBooks 5.2.3 contains an authenticated file upload vulnerability in the Image Manager that allows remote code execution. Attackers can upload a malicious PHP web shell by exploiting unrestricted file type uploads to gain command execution on the server.
Title PhreeBooks 5.2.3 - Remote Code Execution
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-23T16:47:43.329Z

Reserved: 2026-01-18T12:35:05.177Z

Link: CVE-2021-47904

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-23T17:16:03.990

Modified: 2026-01-23T17:16:03.990

Link: CVE-2021-47904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses