CVE-2025-11347: Unrestricted Upload in code-projects Student Crud Operation
A vulnerability was found in code-projects Student Crud Operation up to 3.3. This vulnerability affects the function move_uploaded_file of the file add.php of the component Add Student Page/Edit Student Page. Performing manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-11347 is a vulnerability identified in the Student Crud Operation software by code-projects, affecting versions 3.0 through 3.3. The flaw exists in the add.php file, specifically in the move_uploaded_file function used in the Add Student Page and Edit Student Page components. This function is improperly handling file uploads, allowing attackers to bypass restrictions and upload arbitrary files to the server. Because the vulnerability can be exploited remotely without any authentication or user interaction, an attacker can directly upload malicious files, such as web shells or scripts, which can then be executed on the server. This could lead to full system compromise, data theft, or further lateral movement within the network. The CVSS 4.0 vector indicates a network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually, but combined they pose a significant risk. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of future attacks. The vulnerability is particularly critical for environments where this software is used to manage student data, as it could expose sensitive personal information and disrupt educational services.
Potential Impact
For European organizations, especially educational institutions and entities managing student information, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive student data, including personal and academic records, violating GDPR and other data protection regulations. The ability to upload arbitrary files remotely could enable attackers to deploy malware, ransomware, or web shells, leading to service outages, data loss, or further network compromise. Such incidents could damage institutional reputation, incur regulatory fines, and disrupt educational operations. Given the remote and unauthenticated nature of the exploit, the threat surface is broad, potentially affecting any exposed instance of the vulnerable software. The medium CVSS score reflects moderate but tangible risk, emphasizing the need for timely remediation to prevent exploitation.
Mitigation Recommendations
1. Immediately update the Student Crud Operation software to a patched version once available from the vendor. 2. If patches are not yet released, implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and content signatures. 3. Restrict upload directories with appropriate permissions to prevent execution of uploaded files. 4. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. 5. Monitor logs for unusual file upload activity and access patterns. 6. Disable or restrict the file upload functionality if not essential. 7. Conduct regular security audits and penetration testing focused on file upload mechanisms. 8. Educate administrators on the risks of unrestricted file uploads and ensure secure coding practices are followed in customizations or integrations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-11347: Unrestricted Upload in code-projects Student Crud Operation
Description
A vulnerability was found in code-projects Student Crud Operation up to 3.3. This vulnerability affects the function move_uploaded_file of the file add.php of the component Add Student Page/Edit Student Page. Performing manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11347 is a vulnerability identified in the Student Crud Operation software by code-projects, affecting versions 3.0 through 3.3. The flaw exists in the add.php file, specifically in the move_uploaded_file function used in the Add Student Page and Edit Student Page components. This function is improperly handling file uploads, allowing attackers to bypass restrictions and upload arbitrary files to the server. Because the vulnerability can be exploited remotely without any authentication or user interaction, an attacker can directly upload malicious files, such as web shells or scripts, which can then be executed on the server. This could lead to full system compromise, data theft, or further lateral movement within the network. The CVSS 4.0 vector indicates a network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually, but combined they pose a significant risk. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of future attacks. The vulnerability is particularly critical for environments where this software is used to manage student data, as it could expose sensitive personal information and disrupt educational services.
Potential Impact
For European organizations, especially educational institutions and entities managing student information, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive student data, including personal and academic records, violating GDPR and other data protection regulations. The ability to upload arbitrary files remotely could enable attackers to deploy malware, ransomware, or web shells, leading to service outages, data loss, or further network compromise. Such incidents could damage institutional reputation, incur regulatory fines, and disrupt educational operations. Given the remote and unauthenticated nature of the exploit, the threat surface is broad, potentially affecting any exposed instance of the vulnerable software. The medium CVSS score reflects moderate but tangible risk, emphasizing the need for timely remediation to prevent exploitation.
Mitigation Recommendations
1. Immediately update the Student Crud Operation software to a patched version once available from the vendor. 2. If patches are not yet released, implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and content signatures. 3. Restrict upload directories with appropriate permissions to prevent execution of uploaded files. 4. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. 5. Monitor logs for unusual file upload activity and access patterns. 6. Disable or restrict the file upload functionality if not essential. 7. Conduct regular security audits and penetration testing focused on file upload mechanisms. 8. Educate administrators on the risks of unrestricted file uploads and ensure secure coding practices are followed in customizations or integrations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-06T06:19:12.738Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e4862a6a45552f36eb0389
Added to database: 10/7/2025, 3:16:58 AM
Last enriched: 10/7/2025, 3:32:10 AM
Last updated: 10/7/2025, 1:16:02 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.