CVE-2021-47904
PhreeBooks 5.2.3 - Remote Code Execution
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
PhreeBooks 5.2.3 contains an authenticated file upload vulnerability in the Image Manager that allows remote code execution. Attackers can upload a malicious PHP web shell by exploiting unrestricted file type uploads to gain command execution on the server.
| CWE | CWE-434 |
| Vendor | phreesoft |
| Product | phreebooks |
| Published | Jan 23, 2026 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for phreesoft phreebooks
Be the first to know when new high vulnerabilities affecting phreesoft phreebooks are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Phreesoft / PhreeBooks
5.2.3
References
exploit-db.com: https://www.exploit-db.com/exploits/49524 phreesoft.com: https://www.phreesoft.com/ exploit-db.com: https://www.exploit-db.com/exploits/46645 gist.github.com: https://gist.github.com/joswr1ght/22f40787de19d80d110b37fb79ac3985 vulncheck.com: https://www.vulncheck.com/advisories/phreebooks-remote-code-execution
Credits
Kr0ff