Description
Multiple PHP remote file inclusion vulnerabilities in IAPR COMMENCE 1.3 allow remote attackers to execute arbitrary PHP code via a URL in the (a) php_root_path and sometimes the (b) privilege_root_path parameter to various PHP scripts under (1) admin/includes/, (2) admin/phase/, (3) includes/, (4) includes/page_includes/, (5) reviewer/includes/, (6) reviewer/phase/, and (7) user/phase/.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by ShAy6oOoN · textwebappsphp
https://www.exploit-db.com/exploits/4659
References (4)
Core 4
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/4659
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/27788
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/26570
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38641
Scores
EPSS
0.0485
EPSS Percentile
89.6%
Details
CWE
CWE-94
Status
published
Products (1)
iaprcommence/iapr_commence
1.3
Published
Nov 27, 2007
Tracked Since
Feb 18, 2026