PHP Code Execution Vulnerability in PHP-Charts by PHP-Charts.com
CVE-2013-10070
Key Information:
- Vendor
PHP-charts
- Status
- Vendor
- CVE Published:
- 5 August 2025
Badges
What is CVE-2013-10070?
PHP-Charts v1.0 has a significant vulnerability in the wizard/url.php file that allows untrusted user input to be executed by the eval() function without proper sanitization. This flaw can be exploited by remote attackers who provide specially crafted GET parameter names, which can execute arbitrary PHP code under the context of the web server. By leveraging this issue, attackers can craft base64-encoded payloads, leading to complete system compromise. This vulnerability emphasizes the importance of secure coding practices and input validation in web applications.
Affected Version(s)
PHP-Charts 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved