CVE-2025-11660
BaseFortify
Publication date: 2025-10-13
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oranbyte | school_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an unauthenticated arbitrary file upload issue in the ProjectsAndPrograms School Management System, specifically in the /assets/uploadSllyabus.php file. It allows attackers to upload malicious PHP scripts without any authentication or proper file validation. These uploaded files are stored in a publicly accessible directory, enabling attackers to execute remote code on the server with the web server's privileges. [1]
How can this vulnerability impact me? :
The vulnerability can lead to full server compromise by allowing remote execution of arbitrary operating system commands. It can expose sensitive data such as personally identifiable information (PII), academic records, and system credentials. Additionally, it can disrupt services and cause reputational damage to the affected institution. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability can lead to exposure of sensitive personal data, such as PII and academic records, which may result in non-compliance with data protection regulations like GDPR and HIPAA. Unauthorized access and data breaches caused by this issue could violate requirements for protecting personal information and maintaining data confidentiality. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of uploaded PHP files in the /syllabusUploads/ directory and by testing the /assets/uploadSllyabus.php endpoint for unrestricted file upload. You can use commands like: 1. To find suspicious PHP files in the upload directory: find /path/to/webroot/syllabusUploads/ -name '*.php' 2. To test the upload endpoint, you can use curl to attempt uploading a PHP web shell: curl -F "[email protected]" http://target/assets/uploadSllyabus.php 3. To check web server logs for suspicious POST requests to /assets/uploadSllyabus.php: grep "/assets/uploadSllyabus.php" /var/log/apache2/access.log These steps help identify if arbitrary file upload is possible and if malicious files have been uploaded. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: - Restrict access to the /assets/uploadSllyabus.php endpoint to authenticated users only. - Implement strict file type validation using whitelisting and MIME type checks to prevent uploading executable files like PHP. - Rename uploaded files to prevent direct execution. - Configure the web server to deny execution of files in the /syllabusUploads/ directory or move uploaded files outside the web root. - Monitor and remove any suspicious uploaded files. These measures reduce the risk of remote code execution and limit the impact of the vulnerability. [1]