CVE-2025-13573: Unrestricted Upload in projectworlds can pass malicious payloads
A security flaw has been discovered in projectworlds can pass malicious payloads up to 1.0. This vulnerability affects unknown code of the file /add_book.php. The manipulation of the argument image results in unrestricted upload. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-13573 is a vulnerability identified in projectworlds version 1.0, specifically affecting the /add_book.php endpoint. The flaw arises from improper validation of the 'image' parameter, which allows an attacker to upload files without restriction. This unrestricted upload capability can be exploited remotely without requiring authentication or user interaction, making it a significant risk. The vulnerability could enable attackers to upload malicious payloads such as web shells or malware, leading to remote code execution, data exfiltration, or service disruption. The CVSS 4.0 score is 5.3 (medium), reflecting the ease of remote exploitation but limited scope and impact due to partial confidentiality, integrity, and availability impact. Although no official patch or vendor advisory is currently available, the public release of exploit code increases the likelihood of active exploitation attempts. The vulnerability does not require user interaction or elevated privileges, which lowers the barrier for attackers. The lack of scope change indicates the vulnerability affects only the vulnerable component without spreading to other system parts. The attack vector is network-based, meaning attackers can exploit it over the internet or internal networks where the vulnerable application is accessible.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those using projectworlds version 1.0 in their web applications. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive data, disrupt services, or pivot within the network. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on projectworlds for content or document management could face data breaches or operational downtime. The public availability of exploit code increases the chance of opportunistic attacks, including automated scanning and exploitation by cybercriminals or state-sponsored actors. The impact on confidentiality, integrity, and availability is partial but significant enough to warrant prompt attention. Additionally, the lack of an official patch means organizations must rely on mitigations to reduce risk. Failure to address this vulnerability could lead to reputational damage, regulatory penalties under GDPR, and financial losses.
Mitigation Recommendations
1. Implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and file content signatures to ensure only legitimate image files are accepted. 2. Enforce file size limits and rename uploaded files to prevent execution of malicious scripts. 3. Restrict upload directories to non-executable locations and disable script execution permissions in these directories. 4. Deploy a Web Application Firewall (WAF) with rules to detect and block suspicious file upload attempts targeting /add_book.php or similar endpoints. 5. Monitor logs for unusual upload activity or access patterns to the vulnerable endpoint. 6. Isolate or segment systems running projectworlds 1.0 to limit lateral movement if compromised. 7. If possible, upgrade to a newer, patched version of projectworlds once available. 8. Conduct regular security assessments and penetration tests focusing on file upload functionalities. 9. Educate development teams on secure coding practices related to file uploads. 10. Consider temporary disabling the vulnerable upload functionality if it is not critical to operations until a patch is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-13573: Unrestricted Upload in projectworlds can pass malicious payloads
Description
A security flaw has been discovered in projectworlds can pass malicious payloads up to 1.0. This vulnerability affects unknown code of the file /add_book.php. The manipulation of the argument image results in unrestricted upload. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-13573 is a vulnerability identified in projectworlds version 1.0, specifically affecting the /add_book.php endpoint. The flaw arises from improper validation of the 'image' parameter, which allows an attacker to upload files without restriction. This unrestricted upload capability can be exploited remotely without requiring authentication or user interaction, making it a significant risk. The vulnerability could enable attackers to upload malicious payloads such as web shells or malware, leading to remote code execution, data exfiltration, or service disruption. The CVSS 4.0 score is 5.3 (medium), reflecting the ease of remote exploitation but limited scope and impact due to partial confidentiality, integrity, and availability impact. Although no official patch or vendor advisory is currently available, the public release of exploit code increases the likelihood of active exploitation attempts. The vulnerability does not require user interaction or elevated privileges, which lowers the barrier for attackers. The lack of scope change indicates the vulnerability affects only the vulnerable component without spreading to other system parts. The attack vector is network-based, meaning attackers can exploit it over the internet or internal networks where the vulnerable application is accessible.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those using projectworlds version 1.0 in their web applications. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive data, disrupt services, or pivot within the network. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on projectworlds for content or document management could face data breaches or operational downtime. The public availability of exploit code increases the chance of opportunistic attacks, including automated scanning and exploitation by cybercriminals or state-sponsored actors. The impact on confidentiality, integrity, and availability is partial but significant enough to warrant prompt attention. Additionally, the lack of an official patch means organizations must rely on mitigations to reduce risk. Failure to address this vulnerability could lead to reputational damage, regulatory penalties under GDPR, and financial losses.
Mitigation Recommendations
1. Implement strict server-side validation of uploaded files, including checking MIME types, file extensions, and file content signatures to ensure only legitimate image files are accepted. 2. Enforce file size limits and rename uploaded files to prevent execution of malicious scripts. 3. Restrict upload directories to non-executable locations and disable script execution permissions in these directories. 4. Deploy a Web Application Firewall (WAF) with rules to detect and block suspicious file upload attempts targeting /add_book.php or similar endpoints. 5. Monitor logs for unusual upload activity or access patterns to the vulnerable endpoint. 6. Isolate or segment systems running projectworlds 1.0 to limit lateral movement if compromised. 7. If possible, upgrade to a newer, patched version of projectworlds once available. 8. Conduct regular security assessments and penetration tests focusing on file upload functionalities. 9. Educate development teams on secure coding practices related to file uploads. 10. Consider temporary disabling the vulnerable upload functionality if it is not critical to operations until a patch is released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-23T07:40:32.336Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69239b6adfa0c74de8802fa1
Added to database: 11/23/2025, 11:40:26 PM
Last enriched: 11/23/2025, 11:55:29 PM
Last updated: 11/24/2025, 12:51:30 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41017: CWE-862 Missing Authorization in Davantis DFUSION
MediumCVE-2025-41016: CWE-862 Missing Authorization in Davantis DFUSION
HighCVE-2025-12741: CWE-20 Improper Input Validation in Google Cloud Looker
HighCVE-2025-12740: CWE-20 Improper Input Validation in Google Cloud Looker
HighSpanish Airline Iberia Notifies Customers of Data Breach
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.