Skip to main content

CVE-2025-8174: Unrestricted Upload in code-projects Voting System

Medium
VulnerabilityCVE-2025-8174cvecve-2025-8174
Published: Sat Jul 26 2025 (07/26/2025, 01:04:37 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Voting System

Description

A vulnerability was found in code-projects Voting System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/candidates_add.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/03/2025, 01:01:37 UTC

Technical Analysis

CVE-2025-8174 is a vulnerability identified in version 1.0 of the code-projects Voting System, specifically within the /admin/candidates_add.php file. The issue arises from improper handling of the 'photo' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can upload arbitrary files, potentially including malicious scripts or executables, without sufficient validation or restrictions. The vulnerability can be exploited remotely without requiring user interaction or authentication, increasing the risk of exploitation. Although the CVSS 4.0 base score is 5.3 (medium severity), the unrestricted upload capability can lead to significant consequences such as remote code execution, server compromise, or defacement if the uploaded files are executed or accessed by the system. The vulnerability does not require privileges or user interaction, making it easier to exploit. However, the impact on confidentiality, integrity, and availability is rated low to medium in the CVSS vector, possibly due to limited scope or mitigations in place. No official patches or fixes have been published yet, and while the exploit has been publicly disclosed, there are no known exploits actively used in the wild at this time.

Potential Impact

For European organizations using the code-projects Voting System 1.0, this vulnerability poses a moderate risk. Voting systems are critical infrastructure components, often used in organizational, municipal, or smaller-scale elections. An attacker exploiting this vulnerability could upload malicious files that might lead to unauthorized access, data manipulation, or disruption of voting processes. This could undermine the integrity and trustworthiness of election results, potentially causing reputational damage and legal consequences. Additionally, if the server hosting the voting system is compromised, attackers could pivot to other internal systems, leading to broader network breaches. The medium CVSS score suggests some limitations in exploitation impact, but the critical nature of voting systems elevates the practical risk. European organizations must consider the potential for targeted attacks, especially in politically sensitive environments or where the voting system is exposed to the internet.

Mitigation Recommendations

1. Immediate mitigation should include restricting file upload capabilities by implementing strict validation on the 'photo' parameter, such as allowing only specific file types (e.g., JPEG, PNG) and enforcing size limits. 2. Employ server-side checks to verify file content and reject executable or script files. 3. Use secure directories for file uploads that do not allow execution of uploaded files (e.g., storing files outside the web root or disabling script execution in upload directories). 4. Implement authentication and authorization controls to restrict access to the /admin/candidates_add.php functionality. 5. Monitor logs for unusual upload activity or attempts to upload suspicious files. 6. If possible, isolate the voting system server from other critical infrastructure to limit lateral movement. 7. Since no official patch is available, consider applying virtual patching via web application firewalls (WAF) to block requests containing suspicious payloads targeting the photo parameter. 8. Plan for an upgrade or replacement of the vulnerable voting system software once a vendor patch or a secure alternative is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-25T07:52:57.558Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68842cb9ad5a09ad0058f286

Added to database: 7/26/2025, 1:17:45 AM

Last enriched: 8/3/2025, 1:01:37 AM

Last updated: 8/31/2025, 2:35:52 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats