CVE-2005-0862

EXPLOITED

PHPOpenChat <3.0.1 - RCE

Title source: llm

Description

Multiple PHP remote file inclusion vulnerabilities in PHPOpenChat 3.0.1 and earlier allow remote attackers to execute arbitrary PHP code via the phpbb_root_path parameter to (1) poc_loginform.php or (2) phpbb/poc.php, the poc_root_path parameter to (3) phpbb/poc.php, (4) phpnuke/ENGLISH_poc.php, (5) phpnuke/poc.php, or (6) yabbse/poc.php, or (7) the sourcedir parameter to yabbse/poc.php.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Albania Security Clan · textwebappsphp
https://www.exploit-db.com/exploits/25227
exploitdb WORKING POC VERIFIED
by Albania Security Clan · textwebappsphp
https://www.exploit-db.com/exploits/25228
exploitdb WORKING POC VERIFIED
by Albania Security Clan · textwebappsphp
https://www.exploit-db.com/exploits/25229

Scores

EPSS 0.1427
EPSS Percentile 94.4%

Details

VulnCheck KEV 2019-08-28
Status published
Products (2)
phpopenchat/phpopenchat 2.3.4
phpopenchat/phpopenchat 3.0.1
Published May 02, 2005
Tracked Since Feb 18, 2026