php_api.php in phpWebNotes 2.0.0 uses the extract function to modify key variables such as $t_path_core, which leads to a PHP file inclusion vulnerability that allows remote attackers to execute arbitrary PHP code via the t_path_core parameter.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Phpwebnotes | Phpwebnotes | 2.0.0 (including) | 2.0.0 (including) |