CVE-2025-6870
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-29

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in SourceCodester Simple Company Website 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Content.php?f=service. The manipulation of the argument img leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-29
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-06-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oretnom23 simple_company_website 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6870 is a critical vulnerability in SourceCodester Simple Company Website 1.0, specifically in the /classes/Content.php file's service function. It allows an attacker with some level of authentication to manipulate the 'img' parameter to upload arbitrary files, including malicious PHP scripts, without proper validation. These uploaded files are stored in a publicly accessible directory and can be executed remotely, potentially giving the attacker full control over the server. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution, allowing attackers to run malicious scripts on the server. This can result in full system compromise, data leakage, data tampering, and denial of service. Attackers can upload web shells disguised as image files and execute them, gaining unauthorized control over the affected system. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by monitoring for suspicious file uploads to the /uploads/ directory, especially files with PHP extensions or disguised as images. Network detection can include inspecting HTTP POST requests to /classes/Content.php with the parameter f=service and the img argument carrying multipart/form-data uploads. Commands to detect suspicious files on the server include: 1) Finding recently uploaded PHP files: `find /path/to/uploads/ -type f -name '*.php' -ls` 2) Checking web server logs for POST requests to /classes/Content.php: `grep 'POST /classes/Content.php' /var/log/apache2/access.log` 3) Using file command to verify file types: `file /path/to/uploads/*` 4) Monitoring for anomalous HTTP requests with tools like tcpdump or Wireshark filtering for POST requests to the vulnerable endpoint. Additionally, monitoring for unexpected PHPSESSID usage or authentication anomalies may help detect exploitation attempts. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Enforce strict validation of uploaded files by checking file extensions, MIME types, and file magic bytes to ensure only legitimate image files are accepted. 2) Disable script execution in the upload directory by configuring the web server (e.g., using .htaccess or web.config) to prevent execution of PHP or other scripts. 3) Rename and relocate uploaded files outside the web root with randomized filenames to prevent direct access. 4) Sanitize all file metadata and form inputs to prevent injection or path manipulation. 5) Implement Content Security Policies (CSP) to reduce client-side script execution risks. 6) Monitor and alert on suspicious file uploads using anomaly detection. 7) Change default credentials and restrict access to authenticated users only. 8) Conduct regular security testing including code reviews and dynamic testing. If possible, consider replacing the affected product with a secure alternative. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart