CVE-2024-0783: CWE-434 Unrestricted Upload in Project Worlds Online Admission System
A vulnerability was found in Project Worlds Online Admission System 1.0 and classified as critical. This issue affects some unknown processing of the file documents.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251699.
AI Analysis
Technical Summary
CVE-2024-0783 is a vulnerability identified in Project Worlds Online Admission System version 1.0, classified under CWE-434, which pertains to Unrestricted File Upload. The vulnerability arises from improper handling of file uploads in the documents.php component of the system. Specifically, the system fails to adequately validate or restrict the types and contents of files that can be uploaded by users. This flaw allows an attacker with at least some level of privileges (PR:L - privileges required: low) to remotely upload arbitrary files without user interaction (UI:N). The CVSS score of 6.3 (medium severity) reflects that the vulnerability can be exploited over the network with low attack complexity and no user interaction, potentially leading to limited confidentiality, integrity, and availability impacts. The unrestricted upload could enable attackers to upload malicious scripts or executables, which may then be executed on the server, leading to unauthorized access, data leakage, or service disruption. Although no public exploits are currently known to be in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The absence of patches or mitigation links indicates that the vendor may not have released a fix yet, requiring organizations to implement interim controls. The vulnerability affects only version 1.0 of the product, which is an online admission system likely used by educational institutions or similar organizations to manage admissions processes digitally.
Potential Impact
For European organizations, especially educational institutions or entities using Project Worlds Online Admission System 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, compromise sensitive applicant data, alter admission records, or disrupt admission services. This could result in data breaches involving personal information protected under GDPR, leading to regulatory penalties and reputational damage. The availability of the admission system could be impacted, causing operational delays during critical admission periods. Since the vulnerability requires low privileges but no user interaction, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw. The medium CVSS score suggests moderate but tangible risk, especially if attackers chain this vulnerability with others to escalate privileges or move laterally within networks.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement immediate compensating controls. These include: 1) Restricting file upload permissions strictly to trusted users and roles; 2) Implementing network-level controls such as web application firewalls (WAFs) to detect and block suspicious file upload attempts; 3) Enforcing strict server-side validation of uploaded files by checking MIME types, file extensions, and scanning for malware; 4) Isolating the upload directory with minimal permissions and disabling script execution in that directory to prevent execution of malicious files; 5) Monitoring logs for unusual upload activity or errors related to documents.php; 6) Considering temporary disabling of file upload functionality if feasible during critical periods; 7) Planning for an upgrade or patch deployment once the vendor releases a fix; 8) Conducting user awareness training to reduce the risk of credential compromise that could facilitate exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2024-0783: CWE-434 Unrestricted Upload in Project Worlds Online Admission System
Description
A vulnerability was found in Project Worlds Online Admission System 1.0 and classified as critical. This issue affects some unknown processing of the file documents.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251699.
AI-Powered Analysis
Technical Analysis
CVE-2024-0783 is a vulnerability identified in Project Worlds Online Admission System version 1.0, classified under CWE-434, which pertains to Unrestricted File Upload. The vulnerability arises from improper handling of file uploads in the documents.php component of the system. Specifically, the system fails to adequately validate or restrict the types and contents of files that can be uploaded by users. This flaw allows an attacker with at least some level of privileges (PR:L - privileges required: low) to remotely upload arbitrary files without user interaction (UI:N). The CVSS score of 6.3 (medium severity) reflects that the vulnerability can be exploited over the network with low attack complexity and no user interaction, potentially leading to limited confidentiality, integrity, and availability impacts. The unrestricted upload could enable attackers to upload malicious scripts or executables, which may then be executed on the server, leading to unauthorized access, data leakage, or service disruption. Although no public exploits are currently known to be in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The absence of patches or mitigation links indicates that the vendor may not have released a fix yet, requiring organizations to implement interim controls. The vulnerability affects only version 1.0 of the product, which is an online admission system likely used by educational institutions or similar organizations to manage admissions processes digitally.
Potential Impact
For European organizations, especially educational institutions or entities using Project Worlds Online Admission System 1.0, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized file uploads, enabling attackers to execute arbitrary code, compromise sensitive applicant data, alter admission records, or disrupt admission services. This could result in data breaches involving personal information protected under GDPR, leading to regulatory penalties and reputational damage. The availability of the admission system could be impacted, causing operational delays during critical admission periods. Since the vulnerability requires low privileges but no user interaction, insider threats or compromised low-privilege accounts could be leveraged to exploit this flaw. The medium CVSS score suggests moderate but tangible risk, especially if attackers chain this vulnerability with others to escalate privileges or move laterally within networks.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement immediate compensating controls. These include: 1) Restricting file upload permissions strictly to trusted users and roles; 2) Implementing network-level controls such as web application firewalls (WAFs) to detect and block suspicious file upload attempts; 3) Enforcing strict server-side validation of uploaded files by checking MIME types, file extensions, and scanning for malware; 4) Isolating the upload directory with minimal permissions and disabling script execution in that directory to prevent execution of malicious files; 5) Monitoring logs for unusual upload activity or errors related to documents.php; 6) Considering temporary disabling of file upload functionality if feasible during critical periods; 7) Planning for an upgrade or patch deployment once the vendor releases a fix; 8) Conducting user awareness training to reduce the risk of credential compromise that could facilitate exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-22T11:15:37.497Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b435c1
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:55:52 PM
Last updated: 8/16/2025, 4:44:55 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.