Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11347: Unrestricted Upload in code-projects Student Crud Operation

0
Medium
VulnerabilityCVE-2025-11347cvecve-2025-11347
Published: Tue Oct 07 2025 (10/07/2025, 02:48:36 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Student Crud Operation

Description

A vulnerability was found in code-projects Student Crud Operation up to 3.3. This vulnerability affects the function move_uploaded_file of the file add.php of the component Add Student Page/Edit Student Page. Performing manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 10/07/2025, 03:32:10 UTC

Technical Analysis

CVE-2025-11347 is a vulnerability identified in the Student Crud Operation software by code-projects, affecting versions 3.0 through 3.3. The flaw exists in the add.php file, specifically in the move_uploaded_file function used in the Add Student Page and Edit Student Page components. This function is improperly handling file uploads, allowing attackers to bypass restrictions and upload arbitrary files to the server. Because the vulnerability can be exploited remotely without any authentication or user interaction, an attacker can directly upload malicious files, such as web shells or scripts, which can then be executed on the server. This could lead to full system compromise, data theft, or further lateral movement within the network. The CVSS 4.0 vector indicates a network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability individually, but combined they pose a significant risk. Although no known exploits are currently active in the wild, the public availability of exploit code increases the likelihood of future attacks. The vulnerability is particularly critical for environments where this software is used to manage student data, as it could expose sensitive personal information and disrupt educational services.

Potential Impact

For European organizations, especially educational institutions and entities managing student information, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized access to sensitive student data, including personal and academic records, violating GDPR and other data protection regulations. The ability to upload arbitrary files remotely could enable attackers to deploy malware, ransomware, or web shells, leading to service outages, data loss, or further network compromise. Such incidents could damage institutional reputation, incur regulatory fines, and disrupt educational operations. Given the remote and unauthenticated nature of the exploit, the threat surface is broad, potentially affecting any exposed instance of the vulnerable software. The medium CVSS score reflects moderate but tangible risk, emphasizing the need for timely remediation to prevent exploitation.

Mitigation Recommendations

1. Immediately update the Student Crud Operation software to a patched version once available from the vendor. 2. If patches are not yet released, implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and content signatures. 3. Restrict upload directories with appropriate permissions to prevent execution of uploaded files. 4. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts. 5. Monitor logs for unusual file upload activity and access patterns. 6. Disable or restrict the file upload functionality if not essential. 7. Conduct regular security audits and penetration testing focused on file upload mechanisms. 8. Educate administrators on the risks of unrestricted file uploads and ensure secure coding practices are followed in customizations or integrations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-06T06:19:12.738Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e4862a6a45552f36eb0389

Added to database: 10/7/2025, 3:16:58 AM

Last enriched: 10/7/2025, 3:32:10 AM

Last updated: 10/7/2025, 1:16:02 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats