CVE-2025-7190: Unrestricted Upload in code-projects Library Management System
A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. This affects an unknown part of the file /admin/student_edit_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7190 is a vulnerability identified in the code-projects Library Management System version 2.0. The issue resides in the /admin/student_edit_photo.php file, specifically involving the 'photo' parameter. This vulnerability allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, which could lead to remote code execution or server compromise. The vulnerability has been publicly disclosed, although no known exploits are currently observed in the wild. The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting that the attack vector is network-based with low attack complexity and no user interaction required, but it requires some privileges (PR:L) and has limited impact on confidentiality, integrity, and availability. The vulnerability does not involve scope or security controls bypasses. The lack of patches or mitigation links suggests that no official fix has been released yet. Given the nature of the vulnerability, it poses a significant risk to the integrity and availability of affected systems, especially if exploited to upload web shells or malware, which could facilitate further attacks such as data exfiltration, lateral movement, or denial of service.
Potential Impact
For European organizations using the code-projects Library Management System 2.0, this vulnerability could lead to unauthorized system access and compromise of sensitive data related to library users and operations. Educational institutions, libraries, and other organizations relying on this system may face data breaches, service disruptions, or reputational damage. Since the vulnerability allows remote exploitation without user interaction, attackers can automate attacks at scale, increasing the risk of widespread compromise. The impact on confidentiality is limited but non-negligible, as personal data of students or library users could be exposed. Integrity and availability impacts are more pronounced, as attackers could modify or delete data or disrupt system functionality. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. European organizations must consider compliance with GDPR and other data protection regulations, as exploitation could lead to regulatory penalties.
Mitigation Recommendations
Organizations should immediately audit their deployments of code-projects Library Management System version 2.0 to identify affected instances. Until an official patch is released, implement strict network-level controls to restrict access to the /admin/student_edit_photo.php endpoint, limiting it to trusted IP addresses or VPN users. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts, particularly those that do not conform to expected image file formats or sizes. Validate and sanitize all file uploads on the server side, enforcing strict whitelist checks on file types, extensions, and MIME types. Disable execution permissions on directories used for file uploads to prevent execution of malicious scripts. Monitor logs for unusual upload activity or errors related to the photo upload functionality. Engage with the vendor or community to obtain or request a security patch and apply it promptly once available. Additionally, conduct regular security assessments and penetration testing focused on file upload functionalities to detect similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7190: Unrestricted Upload in code-projects Library Management System
Description
A vulnerability, which was classified as critical, was found in code-projects Library Management System 2.0. This affects an unknown part of the file /admin/student_edit_photo.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7190 is a vulnerability identified in the code-projects Library Management System version 2.0. The issue resides in the /admin/student_edit_photo.php file, specifically involving the 'photo' parameter. This vulnerability allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication. The unrestricted upload means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, which could lead to remote code execution or server compromise. The vulnerability has been publicly disclosed, although no known exploits are currently observed in the wild. The CVSS 4.0 base score is 5.3, indicating a medium severity level, reflecting that the attack vector is network-based with low attack complexity and no user interaction required, but it requires some privileges (PR:L) and has limited impact on confidentiality, integrity, and availability. The vulnerability does not involve scope or security controls bypasses. The lack of patches or mitigation links suggests that no official fix has been released yet. Given the nature of the vulnerability, it poses a significant risk to the integrity and availability of affected systems, especially if exploited to upload web shells or malware, which could facilitate further attacks such as data exfiltration, lateral movement, or denial of service.
Potential Impact
For European organizations using the code-projects Library Management System 2.0, this vulnerability could lead to unauthorized system access and compromise of sensitive data related to library users and operations. Educational institutions, libraries, and other organizations relying on this system may face data breaches, service disruptions, or reputational damage. Since the vulnerability allows remote exploitation without user interaction, attackers can automate attacks at scale, increasing the risk of widespread compromise. The impact on confidentiality is limited but non-negligible, as personal data of students or library users could be exposed. Integrity and availability impacts are more pronounced, as attackers could modify or delete data or disrupt system functionality. The absence of known exploits in the wild currently reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts. European organizations must consider compliance with GDPR and other data protection regulations, as exploitation could lead to regulatory penalties.
Mitigation Recommendations
Organizations should immediately audit their deployments of code-projects Library Management System version 2.0 to identify affected instances. Until an official patch is released, implement strict network-level controls to restrict access to the /admin/student_edit_photo.php endpoint, limiting it to trusted IP addresses or VPN users. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts, particularly those that do not conform to expected image file formats or sizes. Validate and sanitize all file uploads on the server side, enforcing strict whitelist checks on file types, extensions, and MIME types. Disable execution permissions on directories used for file uploads to prevent execution of malicious scripts. Monitor logs for unusual upload activity or errors related to the photo upload functionality. Engage with the vendor or community to obtain or request a security patch and apply it promptly once available. Additionally, conduct regular security assessments and penetration testing focused on file upload functionalities to detect similar issues proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-07T08:18:20.650Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 686d6ae06f40f0eb72f9c550
Added to database: 7/8/2025, 7:00:48 PM
Last enriched: 7/15/2025, 9:54:20 PM
Last updated: 8/19/2025, 10:39:06 PM
Views: 19
Related Threats
CVE-2025-9239: Inadequate Encryption Strength in elunez eladmin
MediumCVE-2025-9238: SQL Injection in Swatadru Exam-Seating-Arrangement
MediumCVE-2025-9237: Cross Site Scripting in CodeAstro Ecommerce Website
MediumCVE-2025-9236: SQL Injection in Portabilis i-Diario
MediumCVE-2025-54551: External control of assumed-Immutable web parameter in FUJIFILM Healthcare Americas Corporation Synapse Mobility
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.