Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13574: Unrestricted Upload in code-projects Online Bidding System

0
Medium
VulnerabilityCVE-2025-13574cvecve-2025-13574
Published: Mon Nov 24 2025 (11/24/2025, 00:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Bidding System

Description

A weakness has been identified in code-projects Online Bidding System 1.0. This issue affects the function categoryadd of the file /administrator/addcategory.php. This manipulation of the argument catimage causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/24/2025, 00:14:33 UTC

Technical Analysis

CVE-2025-13574 identifies an unrestricted file upload vulnerability in the Online Bidding System 1.0 developed by code-projects. The flaw exists in the categoryadd function within the /administrator/addcategory.php script, where the catimage parameter is insufficiently validated, allowing an attacker to upload arbitrary files. This vulnerability can be exploited remotely but requires the attacker to have high-level privileges (e.g., administrative access) on the system. The lack of proper file type validation and sanitization enables an attacker to upload malicious files, potentially leading to remote code execution, defacement, or further compromise of the server hosting the bidding system. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication bypass (AT:N), but requires high privileges (PR:H), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is likely an early or legacy release. The absence of patches or official remediation links suggests that organizations must implement compensating controls or upgrade to a fixed version once available.

Potential Impact

For European organizations using code-projects Online Bidding System 1.0, this vulnerability poses a moderate risk. Successful exploitation could allow an attacker with administrative privileges to upload malicious files, potentially leading to remote code execution, data tampering, or service disruption. This could compromise the confidentiality of sensitive bidding data, integrity of auction processes, and availability of the platform. Given the nature of online bidding systems, such disruptions could result in financial losses, reputational damage, and legal consequences under European data protection regulations such as GDPR. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised administrative credentials, but the availability of a public exploit increases the urgency to address this issue. Organizations relying on this software for critical procurement or auction activities should consider this vulnerability a significant operational risk.

Mitigation Recommendations

To mitigate CVE-2025-13574, European organizations should immediately restrict administrative access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of privilege escalation. Implement strict server-side validation of uploaded files, including whitelisting allowed file types, verifying MIME types, and scanning uploads for malware. Employ web application firewalls (WAFs) to detect and block suspicious file upload attempts. Regularly monitor logs for unusual activity related to the /administrator/addcategory.php endpoint. If possible, upgrade to a patched or newer version of the Online Bidding System once available. In the absence of official patches, consider isolating the bidding system in a segmented network environment to limit potential damage. Conduct security awareness training for administrators to recognize phishing or credential theft attempts that could lead to privilege compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-23T07:48:07.181Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6923a272a532ea377e5f0ea6

Added to database: 11/24/2025, 12:10:26 AM

Last enriched: 11/24/2025, 12:14:33 AM

Last updated: 11/24/2025, 12:52:50 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats