CVE-2007-2985

N/A Unknown
Published: June 01, 2007 Modified: April 23, 2026
View on NVD

Description

Pheap 2.0 allows remote attackers to bypass authentication by setting a pheap_login cookie value to the administrator's username, which can be used to (1) obtain sensitive information, including the administrator password, via settings.php or (2) upload and execute arbitrary PHP code via an update_doc action in edit.php.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/36737
Source: cve@mitre.org
http://secunia.com/advisories/25460
Source: cve@mitre.org
Vendor Advisory
http://osvdb.org/36737
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25460
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/34592
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/4006
Source: af854a3a-2127-422b-91ae-364da2661108

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
16.8%
95th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

pheap