Multiple vulnerabilities have been identified in PMB, which could be exploited by attackers to execute arbitrary commands. These issues are due to input validation errors in various scripts (e.g. "includes/resa_func.inc.php" or "includes/bull_info.inc.php") when processing the "class_path", "include_path" and "base_path" parameters, which could be exploited by remote attackers to include malicious scripts and execute arbitrary commands with the privileges of the web server.