Skip to main content

CVE-2025-7190: Unrestricted Upload in code-projects Library Management System

Medium
VulnerabilityCVE-2025-7190cvecve-2025-7190
Published: Tue Jul 08 2025 (07/08/2025, 18:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Library Management System

Description

A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. This affects an unknown part of the file /admin/student_edit_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/15/2025, 21:54:20 UTC

Technical Analysis

CVE-2025-7190 is a vulnerability identified in the code-projects Library Management System version 2.0. The issue resides in the /admin/student_edit_photo.php file, specifically involving the 'photo' parameter. This vulnerability allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, which could lead to remote code execution or server compromise. The vulnerability has been publicly disclosed, although no known exploits are currently observed in the wild. The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting that the attack vector is network-based with low attack complexity and no user interaction required, but it requires some privileges (PR:L) and has limited impact on confidentiality, integrity, and availability. The vulnerability does not involve scope or security controls bypasses. The lack of patches or mitigation links suggests that no official fix has been released yet. Given the nature of the vulnerability, it poses a significant risk to the integrity and availability of affected systems, especially if exploited to upload web shells or malware, which could facilitate further attacks such as data exfiltration, lateral movement, or denial of service.

Potential Impact

For European organizations using the code-projects Library Management System 2.0, this vulnerability could lead to unauthorized system access and compromise of sensitive data related to library users and operations. Educational institutions, libraries, and other organizations relying on this system may face data breaches, service disruptions, or reputational damage. Since the vulnerability allows remote exploitation without user interaction, attackers can automate attacks at scale, increasing the risk of widespread compromise. The impact on confidentiality is limited but non-negligible, as personal data of students or library users could be exposed. Integrity and availability impacts are more pronounced, as attackers could modify or delete data or disrupt system functionality. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. European organizations must consider compliance with GDPR and other data protection regulations, as exploitation could lead to regulatory penalties.

Mitigation Recommendations

Organizations should immediately audit their deployments of code-projects Library Management System version 2.0 to identify affected instances. Until an official patch is released, implement strict network-level controls to restrict access to the /admin/student_edit_photo.php endpoint, limiting it to trusted IP addresses or VPN users. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts, particularly those that do not conform to expected image file formats or sizes. Validate and sanitize all file uploads on the server side, enforcing strict whitelist checks on file types, extensions, and MIME types. Disable execution permissions on directories used for file uploads to prevent execution of malicious scripts. Monitor logs for unusual upload activity or errors related to the photo upload functionality. Engage with the vendor or community to obtain or request a security patch and apply it promptly once available. Additionally, conduct regular security assessments and penetration testing focused on file upload functionalities to detect similar issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-07T08:18:20.650Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686d6ae06f40f0eb72f9c550

Added to database: 7/8/2025, 7:00:48 PM

Last enriched: 7/15/2025, 9:54:20 PM

Last updated: 8/19/2025, 10:39:06 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats