Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11508: Unrestricted Upload in code-projects Voting System

0
Medium
VulnerabilityCVE-2025-11508cvecve-2025-11508
Published: Wed Oct 08 2025 (10/08/2025, 22:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Voting System

Description

A security vulnerability has been detected in code-projects Voting System 1.0. This affects an unknown function of the file /admin/voters_add.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:01:03 UTC

Technical Analysis

CVE-2025-11508 is a vulnerability identified in version 1.0 of the code-projects Voting System, specifically within the /admin/voters_add.php file. The flaw arises from insufficient validation of the 'photo' parameter, which allows an attacker to perform unrestricted file uploads. This means an attacker with authenticated high-level privileges can upload arbitrary files, including potentially malicious scripts, to the server. The vulnerability is remotely exploitable and does not require user interaction, but it does require the attacker to have high privilege authentication, limiting the attack surface to insiders or compromised accounts. The CVSS 4.0 base score is 5.1, reflecting medium severity, with network attack vector, low complexity, no authentication bypass, and limited impact on confidentiality, integrity, and availability. The vulnerability could lead to unauthorized code execution, data manipulation, or denial of service if exploited. No patches or official fixes have been published yet, and no known exploits are currently active in the wild, but public disclosure increases the risk of future exploitation. Organizations using this voting system should be aware of the risk and take immediate steps to secure their environments.

Potential Impact

The impact of CVE-2025-11508 is primarily on organizations that deploy the code-projects Voting System 1.0, particularly those managing election or voting processes. Successful exploitation could allow attackers with high-level access to upload malicious files, potentially leading to server compromise, unauthorized data access or modification, and disruption of voting operations. This could undermine the integrity and availability of election data, leading to loss of trust and operational disruption. The requirement for high privilege authentication reduces the likelihood of external attackers exploiting the vulnerability directly, but insider threats or compromised administrator accounts pose significant risks. The vulnerability could also be leveraged as a foothold for further lateral movement within an organization’s network. Given the critical nature of voting systems, even a medium severity vulnerability can have outsized consequences if exploited.

Mitigation Recommendations

To mitigate CVE-2025-11508, organizations should immediately restrict access to the /admin/voters_add.php functionality to trusted administrators only and monitor for any suspicious upload activity. Implement strict server-side validation of uploaded files, including checking file types, sizes, and content to prevent malicious uploads. Employ application-level controls such as whitelisting allowed file extensions and scanning uploaded files with antivirus or malware detection tools. Use web application firewalls (WAFs) to detect and block suspicious upload attempts. Enforce strong authentication and session management to reduce the risk of compromised high-privilege accounts. Regularly audit and monitor logs for unusual activity related to file uploads. If possible, isolate the voting system in a segmented network environment to limit potential lateral movement. Stay alert for official patches or updates from the vendor and apply them promptly once available. Consider implementing multi-factor authentication for administrative access to further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-08T14:55:45.427Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e6e6ee7a93ff0f4511642d

Added to database: 10/8/2025, 10:34:22 PM

Last enriched: 2/24/2026, 10:01:03 PM

Last updated: 3/24/2026, 11:21:26 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses