CVE-2005-0862
EXPLOITEDPHPOpenChat <3.0.1 - RCE
Title source: llmDescription
Multiple PHP remote file inclusion vulnerabilities in PHPOpenChat 3.0.1 and earlier allow remote attackers to execute arbitrary PHP code via the phpbb_root_path parameter to (1) poc_loginform.php or (2) phpbb/poc.php, the poc_root_path parameter to (3) phpbb/poc.php, (4) phpnuke/ENGLISH_poc.php, (5) phpnuke/poc.php, or (6) yabbse/poc.php, or (7) the sourcedir parameter to yabbse/poc.php.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Albania Security Clan · textwebappsphp
https://www.exploit-db.com/exploits/25227
exploitdb
WORKING POC
VERIFIED
by Albania Security Clan · textwebappsphp
https://www.exploit-db.com/exploits/25228
exploitdb
WORKING POC
VERIFIED
by Albania Security Clan · textwebappsphp
https://www.exploit-db.com/exploits/25229
References (10)
Scores
EPSS
0.1427
EPSS Percentile
94.4%
Details
VulnCheck KEV
2019-08-28
Status
published
Products (2)
phpopenchat/phpopenchat
2.3.4
phpopenchat/phpopenchat
3.0.1
Published
May 02, 2005
Tracked Since
Feb 18, 2026