CVE-2025-14583: Unrestricted Upload in campcodes Online Student Enrollment System
A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown function of the file /admin/register.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-14583 identifies a vulnerability in the campcodes Online Student Enrollment System version 1.0, specifically in the /admin/register.php file. The flaw arises from improper validation of the 'photo' parameter, which allows attackers to perform unrestricted file uploads remotely without authentication or user interaction. This means an attacker can upload malicious files, such as web shells or malware, to the server, potentially leading to remote code execution, data theft, or disruption of services. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low to limited but still significant due to the possibility of chaining this vulnerability with others for full system compromise. Although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet. The unrestricted upload flaw is a common and critical security issue in web applications, especially those handling sensitive data such as student enrollment information.
Potential Impact
For European organizations, particularly educational institutions using campcodes Online Student Enrollment System 1.0, this vulnerability poses a risk of unauthorized access, data leakage, and potential disruption of enrollment services. Attackers could upload malicious scripts to gain control over the system, manipulate student data, or deploy ransomware. This could lead to loss of sensitive personal data protected under GDPR, resulting in legal and financial repercussions. Additionally, service downtime during remediation could impact academic operations. The medium severity score reflects that while immediate full compromise is not guaranteed, the vulnerability is easily exploitable remotely without authentication, increasing the threat surface. The impact is more pronounced in countries with widespread adoption of this software or where educational institutions are high-profile targets for cyberattacks.
Mitigation Recommendations
Organizations should immediately implement strict server-side validation on file uploads, including limiting allowed file types to safe image formats (e.g., JPEG, PNG), enforcing file size limits, and scanning uploaded files for malware. Disabling direct execution permissions on upload directories can prevent execution of malicious scripts. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious upload attempts targeting /admin/register.php. Since no official patches are available yet, organizations should consider temporary mitigations such as restricting access to the admin interface by IP whitelisting or VPN. Monitoring logs for unusual upload activity and deploying intrusion detection systems can help identify exploitation attempts. Once a vendor patch is released, prompt application is critical. Additionally, organizations should review and harden overall web application security posture to prevent exploitation of chained vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-14583: Unrestricted Upload in campcodes Online Student Enrollment System
Description
A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown function of the file /admin/register.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-14583 identifies a vulnerability in the campcodes Online Student Enrollment System version 1.0, specifically in the /admin/register.php file. The flaw arises from improper validation of the 'photo' parameter, which allows attackers to perform unrestricted file uploads remotely without authentication or user interaction. This means an attacker can upload malicious files, such as web shells or malware, to the server, potentially leading to remote code execution, data theft, or disruption of services. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low to limited but still significant due to the possibility of chaining this vulnerability with others for full system compromise. Although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been published yet. The unrestricted upload flaw is a common and critical security issue in web applications, especially those handling sensitive data such as student enrollment information.
Potential Impact
For European organizations, particularly educational institutions using campcodes Online Student Enrollment System 1.0, this vulnerability poses a risk of unauthorized access, data leakage, and potential disruption of enrollment services. Attackers could upload malicious scripts to gain control over the system, manipulate student data, or deploy ransomware. This could lead to loss of sensitive personal data protected under GDPR, resulting in legal and financial repercussions. Additionally, service downtime during remediation could impact academic operations. The medium severity score reflects that while immediate full compromise is not guaranteed, the vulnerability is easily exploitable remotely without authentication, increasing the threat surface. The impact is more pronounced in countries with widespread adoption of this software or where educational institutions are high-profile targets for cyberattacks.
Mitigation Recommendations
Organizations should immediately implement strict server-side validation on file uploads, including limiting allowed file types to safe image formats (e.g., JPEG, PNG), enforcing file size limits, and scanning uploaded files for malware. Disabling direct execution permissions on upload directories can prevent execution of malicious scripts. Network-level controls such as web application firewalls (WAFs) should be configured to detect and block suspicious upload attempts targeting /admin/register.php. Since no official patches are available yet, organizations should consider temporary mitigations such as restricting access to the admin interface by IP whitelisting or VPN. Monitoring logs for unusual upload activity and deploying intrusion detection systems can help identify exploitation attempts. Once a vendor patch is released, prompt application is critical. Additionally, organizations should review and harden overall web application security posture to prevent exploitation of chained vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-12T14:49:13.077Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693c958a5292e65bc6123153
Added to database: 12/12/2025, 10:22:02 PM
Last enriched: 12/19/2025, 10:54:36 PM
Last updated: 2/7/2026, 10:01:33 PM
Views: 84
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall
CriticalCVE-2026-25857: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Shenzhen Tenda Technology Tenda G300-F
HighCVE-2025-15564: Divide By Zero in Mapnik
MediumCVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumCVE-2026-2111: Path Traversal in JeecgBoot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.