PHP Code Execution Vulnerability in PHP-Charts by PHP-Charts.com
CVE-2013-10070

10CRITICAL

Key Information:

Vendor

PHP-charts

Vendor
CVE Published:
5 August 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2013-10070?

PHP-Charts v1.0 has a significant vulnerability in the wizard/url.php file that allows untrusted user input to be executed by the eval() function without proper sanitization. This flaw can be exploited by remote attackers who provide specially crafted GET parameter names, which can execute arbitrary PHP code under the context of the web server. By leveraging this issue, attackers can craft base64-encoded payloads, leading to complete system compromise. This vulnerability emphasizes the importance of secure coding practices and input validation in web applications.

Affected Version(s)

PHP-Charts 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

AkaStep
.