Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66802: n/a

0
Critical
VulnerabilityCVE-2025-66802cvecve-2025-66802
Published: Mon Jan 12 2026 (01/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Sourcecodester Covid-19 Contact Tracing System 1.0 is vulnerable to RCE (Remote Code Execution). The application receives a reverse shell (php) into imagem of the user enabling RCE.

AI-Powered Analysis

AILast updated: 01/12/2026, 19:38:06 UTC

Technical Analysis

CVE-2025-66802 is a critical remote code execution vulnerability found in Sourcecodester Covid-19 Contact Tracing System version 1.0. The vulnerability stems from improper handling of user-uploaded images, which the application processes without sufficient validation or sanitization. Attackers can embed PHP reverse shell code within the image files, which the server then executes, granting attackers remote shell access. This allows full control over the affected server, enabling data theft, system manipulation, or pivoting within the network. The vulnerability does not require prior authentication or user interaction beyond submitting a crafted image, making exploitation straightforward. No official patches or fixes have been released, and no known exploits have been observed in the wild yet. The lack of a CVSS score necessitates an expert severity assessment, which rates this vulnerability as critical due to the high impact on confidentiality, integrity, and availability, combined with ease of exploitation and broad potential impact. The vulnerability is particularly concerning for organizations managing sensitive health data, as contact tracing systems are integral to public health responses. The attack vector involves uploading malicious images that the system processes as PHP code, indicating a failure to segregate executable content from user uploads and a lack of secure coding practices around file handling. Immediate mitigation steps include disabling PHP execution in upload directories, implementing strict file type validation, and sanitizing all user inputs related to file uploads.

Potential Impact

European organizations using the vulnerable Covid-19 Contact Tracing System face severe risks including unauthorized access to sensitive personal and health data, disruption of contact tracing operations, and potential lateral movement within their networks. The compromise of such systems could undermine public trust in health initiatives and lead to regulatory penalties under GDPR due to data breaches. The ability for attackers to execute arbitrary code remotely without authentication means that even external threat actors can exploit this vulnerability, increasing the attack surface. Disruption or manipulation of contact tracing data could also have public health consequences, affecting pandemic response efforts. Additionally, compromised servers could be used as footholds for further attacks against other critical infrastructure. The absence of patches increases the urgency for organizations to implement compensating controls. The impact extends beyond confidentiality to integrity and availability, as attackers can alter or delete data and disrupt system operations.

Mitigation Recommendations

1. Immediately identify and inventory all deployments of Sourcecodester Covid-19 Contact Tracing System 1.0 within the organization. 2. Disable PHP execution in directories used for user-uploaded content by configuring the web server (e.g., using .htaccess or server config to deny execution). 3. Implement strict server-side validation to allow only legitimate image file types (e.g., JPEG, PNG) and reject files containing embedded executable code. 4. Use file scanning tools to detect and block files containing PHP or other scripting code. 5. Employ application-level input sanitization and validation to prevent malicious payloads in uploads. 6. Monitor logs for suspicious upload activity or unexpected reverse shell connections. 7. Consider isolating the contact tracing system in a segmented network zone with limited access to critical infrastructure. 8. Engage with the software vendor or community to obtain or develop patches or updated versions addressing this vulnerability. 9. Educate administrators and users about the risks of uploading untrusted files and enforce strict access controls. 10. Prepare incident response plans to quickly contain and remediate any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69654a41da2266e83806dde7

Added to database: 1/12/2026, 7:23:45 PM

Last enriched: 1/12/2026, 7:38:06 PM

Last updated: 1/12/2026, 11:34:14 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats