Skip to main content

CVE-2024-0783: CWE-434 Unrestricted Upload in Project Worlds Online Admission System

Medium
VulnerabilityCVE-2024-0783cvecve-2024-0783cwe-434
Published: Mon Jan 22 2024 (01/22/2024, 17:31:03 UTC)
Source: CVE Database V5
Vendor/Project: Project Worlds
Product: Online Admission System

Description

A vulnerability was found in Project Worlds Online Admission System 1.0 and classified as critical. This issue affects some unknown processing of the file documents.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251699.

AI-Powered Analysis

AILast updated: 07/08/2025, 16:55:52 UTC

Technical Analysis

CVE-2024-0783 is a vulnerability identified in Project Worlds Online Admission System version 1.0, classified under CWE-434, which pertains to Unrestricted File Upload. The vulnerability arises from improper handling of file uploads in the documents.php component of the system. Specifically, the system fails to adequately validate or restrict the types and contents of files that can be uploaded by users. This flaw allows an attacker with at least some level of privileges (PR:L - privileges required: low) to remotely upload arbitrary files without user interaction (UI:N). The CVSS score of 6.3 (medium severity) reflects that the vulnerability can be exploited over the network with low attack complexity and no user interaction, potentially leading to limited confidentiality, integrity, and availability impacts. The unrestricted upload could enable attackers to upload malicious scripts or executables, which may then be executed on the server, leading to unauthorized access, data leakage, or service disruption. Although no public exploits are currently known to be in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The absence of patches or mitigation links indicates that the vendor may not have released a fix yet, requiring organizations to implement interim controls. The vulnerability affects only version 1.0 of the product, which is an online admission system likely used by educational institutions or similar organizations to manage admissions processes digitally.

Potential Impact

For European organizations, especially educational institutions or entities using Project Worlds Online Admission System 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, compromise sensitive applicant data, alter admission records, or disrupt admission services. This could result in data breaches involving personal information protected under GDPR, leading to regulatory penalties and reputational damage. The availability of the admission system could be impacted, causing operational delays during critical admission periods. Since the vulnerability requires low privileges but no user interaction, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw. The medium CVSS score suggests moderate but tangible risk, especially if attackers chain this vulnerability with others to escalate privileges or move laterally within networks.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement immediate compensating controls. These include: 1) Restricting file upload permissions strictly to trusted users and roles; 2) Implementing network-level controls such as web application firewalls (WAFs) to detect and block suspicious file upload attempts; 3) Enforcing strict server-side validation of uploaded files by checking MIME types, file extensions, and scanning for malware; 4) Isolating the upload directory with minimal permissions and disabling script execution in that directory to prevent execution of malicious files; 5) Monitoring logs for unusual upload activity or errors related to documents.php; 6) Considering temporary disabling of file upload functionality if feasible during critical periods; 7) Planning for an upgrade or patch deployment once the vendor releases a fix; 8) Conducting user awareness training to reduce the risk of credential compromise that could facilitate exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-22T11:15:37.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b435c1

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 4:55:52 PM

Last updated: 8/16/2025, 4:44:55 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats