Skip to main content

CVE-2025-10600: Unrestricted Upload in SourceCodester Online Exam Form Submission

Medium
VulnerabilityCVE-2025-10600cvecve-2025-10600
Published: Wed Sep 17 2025 (09/17/2025, 16:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Exam Form Submission

Description

A flaw has been found in SourceCodester Online Exam Form Submission 1.0. This impacts an unknown function of the file /register.php. This manipulation of the argument img causes unrestricted upload. It is possible to initiate the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 09/17/2025, 16:39:13 UTC

Technical Analysis

CVE-2025-10600 is a vulnerability identified in SourceCodester Online Exam Form Submission version 1.0. The flaw exists in the /register.php file, specifically related to the handling of the 'img' argument. This vulnerability allows an attacker to perform an unrestricted file upload remotely without any authentication or user interaction. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, to the server hosting the application. Once uploaded, these files could be executed or accessed, leading to further compromise such as remote code execution, data theft, or server takeover. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector details show the attack can be performed remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to medium, suggesting some limited but meaningful damage could be done if exploited. Although no known exploits are reported in the wild yet, the exploit code has been published, increasing the risk of future attacks. The lack of available patches or mitigations from the vendor at this time further elevates the threat. This vulnerability is particularly concerning for organizations using this specific online exam form submission software, as it could allow attackers to bypass security controls and compromise the system remotely via file upload abuse.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the adoption of the SourceCodester Online Exam Form Submission 1.0 software. Educational institutions, certification bodies, or training providers using this software for exam registrations or form submissions could face significant risks. Exploitation could lead to unauthorized access to sensitive student or candidate data, manipulation of exam records, or disruption of exam processes. Additionally, uploaded malicious files could be used as a foothold for further network intrusion, lateral movement, or data exfiltration. Given the remote and unauthenticated nature of the attack, any exposed instance of this software is at risk. This could undermine trust in online examination systems and cause reputational damage. Moreover, if exploited, it could lead to violations of data protection regulations such as GDPR, resulting in legal and financial penalties. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise without additional factors. However, the ease of exploitation and lack of required privileges make it a notable threat vector for European organizations relying on this software.

Mitigation Recommendations

Immediate mitigation should focus on restricting file upload capabilities within the /register.php endpoint. Organizations should implement strict server-side validation of uploaded files, including checking file types, sizes, and content signatures to prevent malicious files from being accepted. Employing allowlists for permitted file extensions and scanning uploads with antivirus or malware detection tools is recommended. Additionally, isolating the upload directory with minimal permissions and disabling execution rights on uploaded files can reduce the risk of remote code execution. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block suspicious upload attempts targeting the 'img' parameter. Since no official patch is currently available, organizations should consider temporarily disabling the vulnerable upload functionality if feasible. Monitoring logs for unusual upload activity and implementing intrusion detection systems can help detect exploitation attempts. Finally, organizations should engage with the vendor or community to track patch releases and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T06:46:13.117Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cae414bbadf27e02c744cc

Added to database: 9/17/2025, 4:38:44 PM

Last enriched: 9/17/2025, 4:39:13 PM

Last updated: 9/17/2025, 4:39:19 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats