Skip to main content

CVE-2025-10424: Unrestricted Upload in 1000projects Online Student Project Report Submission and Evaluation System

Medium
VulnerabilityCVE-2025-10424cvecve-2025-10424
Published: Mon Sep 15 2025 (09/15/2025, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: 1000projects
Product: Online Student Project Report Submission and Evaluation System

Description

A vulnerability was determined in 1000projects Online Student Project Report Submission and Evaluation System 1.0. The affected element is an unknown function of the file /admin/controller/faculty_controller.php. This manipulation of the argument new_image causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/15/2025, 04:00:42 UTC

Technical Analysis

CVE-2025-10424 is a vulnerability identified in version 1.0 of the 1000projects Online Student Project Report Submission and Evaluation System. The flaw exists in the /admin/controller/faculty_controller.php file, specifically related to the handling of the 'new_image' argument. This vulnerability allows an attacker to perform an unrestricted file upload remotely without requiring authentication or user interaction. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, to the server hosting the application. This can lead to remote code execution, server compromise, data theft, or further lateral movement within the network. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the exploit has been publicly disclosed, increasing the risk of exploitation. The vulnerability affects a niche educational software product used for student project report submissions and evaluations, which may be deployed in academic institutions or educational organizations. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, particularly educational institutions using the 1000projects system, this vulnerability poses a significant risk. Successful exploitation could allow attackers to upload malicious payloads, leading to unauthorized access to sensitive student data, academic records, and internal evaluation processes. This could result in data breaches violating GDPR regulations, reputational damage, and operational disruptions. Additionally, attackers could leverage the compromised system as a foothold to pivot into broader institutional networks, potentially affecting research data or administrative systems. The medium severity rating reflects that while the impact is serious, the scope is limited to organizations using this specific software. However, given the critical nature of educational data and the regulatory environment in Europe, even medium-severity vulnerabilities warrant prompt attention. The fact that exploitation requires no authentication or user interaction increases the threat level, as attackers can attempt exploitation remotely without needing insider access.

Mitigation Recommendations

1. Immediate isolation or removal of the affected 1000projects Online Student Project Report Submission and Evaluation System instances until a patch or update is available. 2. Implement strict network segmentation and firewall rules to restrict external access to the administration interface, especially the /admin/controller/faculty_controller.php endpoint. 3. Employ web application firewalls (WAF) with custom rules to detect and block suspicious file upload attempts targeting the 'new_image' parameter. 4. Conduct manual code review or penetration testing to identify and block unrestricted file upload vectors, potentially adding server-side validation to restrict file types, sizes, and content. 5. Monitor logs for unusual upload activity or unexpected file creations in the application directories. 6. If feasible, replace or upgrade to a more secure project submission system with active vendor support and regular security updates. 7. Educate administrative staff about the risks and signs of compromise related to this vulnerability. 8. Prepare incident response plans to quickly contain and remediate any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-14T06:37:20.215Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c78c4139776bc2a1496662

Added to database: 9/15/2025, 3:47:13 AM

Last enriched: 9/15/2025, 4:00:42 AM

Last updated: 9/15/2025, 4:35:26 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats