CVE-2025-8504: Unrestricted Upload in code-projects Kitchen Treasure
A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8504 is a vulnerability identified in version 1.0 of the code-projects Kitchen Treasure application, specifically within the /userregistration.php file. The vulnerability arises from improper handling of the 'photo' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can remotely upload arbitrary files without proper validation or restrictions. Such unrestricted upload vulnerabilities often lead to severe consequences, including remote code execution, server compromise, or defacement, depending on the nature of the uploaded file and the server configuration. The vulnerability is remotely exploitable without user interaction and requires low privileges (PR:L), indicating that an attacker with limited access could exploit it. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (AT:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit has been publicly disclosed but there are no known exploits in the wild yet. No patches or mitigation links are currently provided, which suggests that users of Kitchen Treasure 1.0 remain vulnerable until a fix is released or mitigations are applied. Given the critical nature of unrestricted file uploads, this vulnerability poses a significant security risk to affected systems.
Potential Impact
For European organizations using Kitchen Treasure 1.0, this vulnerability could lead to unauthorized system access, data breaches, or service disruption. Attackers could upload malicious scripts or web shells, enabling persistent access or lateral movement within the network. This could compromise sensitive user data or intellectual property, damage organizational reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The medium CVSS score reflects limited impact on confidentiality, integrity, and availability individually, but the unrestricted upload vector could be leveraged in chained attacks, increasing overall risk. Organizations relying on Kitchen Treasure for user registration or content management should consider this vulnerability a priority due to its remote exploitability and lack of required user interaction. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially since exploit code is publicly available.
Mitigation Recommendations
Since no official patch or update is currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting file upload types by enforcing strict server-side validation of file extensions and MIME types. 2) Implementing file content inspection to detect and block executable or script files. 3) Applying access controls on upload directories to prevent execution of uploaded files (e.g., disabling script execution in upload folders via web server configuration). 4) Monitoring and logging upload activities to detect suspicious behavior. 5) Employing web application firewalls (WAFs) with rules to block malicious upload attempts. 6) Isolating the affected application environment to limit potential lateral movement. Additionally, organizations should track vendor communications for patches and test updates promptly upon release. Conducting regular security assessments and penetration testing focusing on file upload functionality is also recommended to identify residual risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-8504: Unrestricted Upload in code-projects Kitchen Treasure
Description
A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8504 is a vulnerability identified in version 1.0 of the code-projects Kitchen Treasure application, specifically within the /userregistration.php file. The vulnerability arises from improper handling of the 'photo' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can remotely upload arbitrary files without proper validation or restrictions. Such unrestricted upload vulnerabilities often lead to severe consequences, including remote code execution, server compromise, or defacement, depending on the nature of the uploaded file and the server configuration. The vulnerability is remotely exploitable without user interaction and requires low privileges (PR:L), indicating that an attacker with limited access could exploit it. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (AT:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit has been publicly disclosed but there are no known exploits in the wild yet. No patches or mitigation links are currently provided, which suggests that users of Kitchen Treasure 1.0 remain vulnerable until a fix is released or mitigations are applied. Given the critical nature of unrestricted file uploads, this vulnerability poses a significant security risk to affected systems.
Potential Impact
For European organizations using Kitchen Treasure 1.0, this vulnerability could lead to unauthorized system access, data breaches, or service disruption. Attackers could upload malicious scripts or web shells, enabling persistent access or lateral movement within the network. This could compromise sensitive user data or intellectual property, damage organizational reputation, and lead to regulatory non-compliance under GDPR if personal data is exposed. The medium CVSS score reflects limited impact on confidentiality, integrity, and availability individually, but the unrestricted upload vector could be leveraged in chained attacks, increasing overall risk. Organizations relying on Kitchen Treasure for user registration or content management should consider this vulnerability a priority due to its remote exploitability and lack of required user interaction. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially since exploit code is publicly available.
Mitigation Recommendations
Since no official patch or update is currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting file upload types by enforcing strict server-side validation of file extensions and MIME types. 2) Implementing file content inspection to detect and block executable or script files. 3) Applying access controls on upload directories to prevent execution of uploaded files (e.g., disabling script execution in upload folders via web server configuration). 4) Monitoring and logging upload activities to detect suspicious behavior. 5) Employing web application firewalls (WAFs) with rules to block malicious upload attempts. 6) Isolating the affected application environment to limit potential lateral movement. Additionally, organizations should track vendor communications for patches and test updates promptly upon release. Conducting regular security assessments and penetration testing focusing on file upload functionality is also recommended to identify residual risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-02T07:01:28.208Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 688f141fad5a09ad00d94bd5
Added to database: 8/3/2025, 7:47:43 AM
Last enriched: 8/3/2025, 8:02:58 AM
Last updated: 8/5/2025, 9:52:40 PM
Views: 12
Related Threats
CVE-2025-54872: CWE-798: Use of Hard-coded Credentials in Vessel9817 onion-site-template
HighCVE-2025-54884: CWE-400: Uncontrolled Resource Consumption in DavidOsipov Vision-ui
HighCVE-2025-54883: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in DavidOsipov Vision-ui
CriticalCVE-2025-54876: CWE-522: Insufficiently Protected Credentials in JanssenProject jans
MediumCVE-2025-54869: CWE-770: Allocation of Resources Without Limits or Throttling in Setasign FPDI
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.