CVE-2025-11660
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-13

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. Affected by this issue is some unknown functionality of the file /assets/uploadSllyabus.php. Such manipulation of the argument File leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-13
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oranbyte school_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an unauthenticated arbitrary file upload issue in the ProjectsAndPrograms School Management System, specifically in the /assets/uploadSllyabus.php file. It allows attackers to upload malicious PHP scripts without any authentication or proper file validation. These uploaded files are stored in a publicly accessible directory, enabling attackers to execute remote code on the server with the web server's privileges. [1]


How can this vulnerability impact me? :

The vulnerability can lead to full server compromise by allowing remote execution of arbitrary operating system commands. It can expose sensitive data such as personally identifiable information (PII), academic records, and system credentials. Additionally, it can disrupt services and cause reputational damage to the affected institution. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability can lead to exposure of sensitive personal data, such as PII and academic records, which may result in non-compliance with data protection regulations like GDPR and HIPAA. Unauthorized access and data breaches caused by this issue could violate requirements for protecting personal information and maintaining data confidentiality. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of uploaded PHP files in the /syllabusUploads/ directory and by testing the /assets/uploadSllyabus.php endpoint for unrestricted file upload. You can use commands like: 1. To find suspicious PHP files in the upload directory: find /path/to/webroot/syllabusUploads/ -name '*.php' 2. To test the upload endpoint, you can use curl to attempt uploading a PHP web shell: curl -F "[email protected]" http://target/assets/uploadSllyabus.php 3. To check web server logs for suspicious POST requests to /assets/uploadSllyabus.php: grep "/assets/uploadSllyabus.php" /var/log/apache2/access.log These steps help identify if arbitrary file upload is possible and if malicious files have been uploaded. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: - Restrict access to the /assets/uploadSllyabus.php endpoint to authenticated users only. - Implement strict file type validation using whitelisting and MIME type checks to prevent uploading executable files like PHP. - Rename uploaded files to prevent direct execution. - Configure the web server to deny execution of files in the /syllabusUploads/ directory or move uploaded files outside the web root. - Monitor and remove any suspicious uploaded files. These measures reduce the risk of remote code execution and limit the impact of the vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart