Description
php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26201
References (4)
Core 4
Core References
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14679
Exploit vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/alerts/2005/Aug/1014807.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112516693300371&w=2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22040
Scores
EPSS
0.0226
EPSS Percentile
84.8%
Details
Status
published
Products (1)
phpwebnotes/phpwebnotes
2.0.0
Published
Sep 02, 2005
Tracked Since
Feb 18, 2026