Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13574: Unrestricted Upload in code-projects Online Bidding System

0
Medium
VulnerabilityCVE-2025-13574cvecve-2025-13574
Published: Mon Nov 24 2025 (11/24/2025, 00:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Bidding System

Description

A weakness has been identified in code-projects Online Bidding System 1.0. This issue affects the function categoryadd of the file /administrator/addcategory.php. This manipulation of the argument catimage causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/01/2025, 01:07:46 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13574 affects code-projects Online Bidding System version 1.0. The issue resides in the categoryadd function within the /administrator/addcategory.php file, where the catimage parameter is insufficiently validated, allowing unrestricted file uploads. This flaw enables an attacker with administrative privileges to upload arbitrary files remotely, potentially including malicious scripts or webshells. The vulnerability does not require user interaction but does require high-level privileges, indicating that the attacker must already have administrative access or credentials. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low complexity, no authentication required beyond high privileges, and partial impact on confidentiality, integrity, and availability. Although no exploits are currently observed in the wild, proof-of-concept exploits have been published, increasing the risk of exploitation. The unrestricted upload can lead to remote code execution, data leakage, or service disruption if exploited. The lack of vendor patches at the time of publication necessitates immediate mitigation steps by affected organizations.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized file uploads that compromise the integrity and availability of the affected bidding system. Attackers could deploy webshells or malware, leading to data breaches, defacement, or disruption of online bidding services. This is particularly critical for organizations relying on this system for commercial transactions or sensitive bidding processes. The partial impact on confidentiality and integrity could expose sensitive bidder information or allow manipulation of bidding categories. Availability impact could disrupt business operations and damage trust. Given the remote attack vector and public availability of exploit code, the threat is significant for organizations that have not restricted administrative access or implemented upload controls. The medium severity rating suggests moderate but actionable risk, especially in environments with weak internal controls.

Mitigation Recommendations

1. Immediately restrict access to the /administrator/addcategory.php functionality to trusted administrators only, using network segmentation and strong authentication mechanisms such as multi-factor authentication. 2. Implement strict server-side validation of uploaded files, including checking file types, extensions, MIME types, and scanning for malicious content. 3. Employ allowlists for permitted file formats and reject all others. 4. Monitor file upload directories for unexpected or suspicious files and implement file integrity monitoring. 5. Apply web application firewalls (WAF) rules to detect and block attempts to exploit this vulnerability. 6. Regularly audit administrative accounts and revoke unnecessary privileges to reduce the risk of high-privilege compromise. 7. Stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. 8. Conduct security awareness training for administrators to recognize suspicious activities. 9. Consider isolating the bidding system environment to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-23T07:48:07.181Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6923a272a532ea377e5f0ea6

Added to database: 11/24/2025, 12:10:26 AM

Last enriched: 12/1/2025, 1:07:46 AM

Last updated: 1/8/2026, 6:02:45 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats