CVE-2007-5697

PHP Image 1.2 - Remote Code Execution via xarg Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-5697. PoCs published by Civi.

AI-analyzed exploit summary This exploit demonstrates a remote file inclusion vulnerability in PHP Image v1.2, where the 'xarg' parameter in multiple PHP files is not sanitized, allowing an attacker to include arbitrary remote files.

Description

Multiple PHP remote file inclusion vulnerabilities in PHP Image 1.2 allow remote attackers to execute arbitrary PHP code via a URL in the xarg parameter to (1) xarg_corner.php, (2) xarg_corner_bottom.php, and (3) xarg_corner_top.php.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Civi · textwebappsphp
https://www.exploit-db.com/exploits/4565

This exploit demonstrates a remote file inclusion vulnerability in PHP Image v1.2, where the 'xarg' parameter in multiple PHP files is not sanitized, allowing an attacker to include arbitrary remote files.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: PHP Image v1.2
No auth needed
Prerequisites: Remote file inclusion must be enabled on the target server · Attacker must be able to reach the target with a malicious URL
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/40743
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/40742
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/40744
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/4565
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26187

Scores

EPSS 0.0529
EPSS Percentile 90.1%

Details

CWE
CWE-94
Status published
Products (1)
phpimage/php_image 1.2
Published Oct 29, 2007
Tracked Since Feb 18, 2026