CVE-2025-12301
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-27

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security vulnerability has been detected in code-projects Simple Food Ordering System 1.0. Impacted is an unknown function of the file /editproduct.php. Such manipulation of the argument photo leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-27
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fabian simple_food_ordering_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-12301 is an unrestricted file upload vulnerability in the Simple Food Ordering System version 1.0, specifically in the /editproduct.php file. The vulnerability occurs because the system does not properly validate the uploaded files' type, content, extension, or size, allowing attackers to upload malicious files such as webshells or executable scripts. These files can be uploaded remotely without authentication, enabling attackers to execute arbitrary code on the server and compromise the system. [1, 2, 3]


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to unauthorized server access, remote code execution, full system compromise, leakage of sensitive data, and potential disruption of services. Attackers can upload malicious files that run arbitrary commands on the server, which threatens the confidentiality, integrity, and availability of the affected system. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by searching for the presence of the vulnerable file upload endpoint, specifically "editproduct.php". One method is to use Google hacking techniques with the query "inurl:editproduct.php" to identify potentially vulnerable targets. Additionally, monitoring web server logs for unusual file upload activity or requests containing suspicious file extensions (e.g., .php) to the "photo" argument can help detect exploitation attempts. Since the vulnerability allows uploading of malicious files such as webshells, scanning the web-accessible upload directories for unexpected PHP or executable files is recommended. Commands to assist detection include: 1) Using curl or wget to test file upload functionality manually, 2) Using find or grep on the server to locate suspicious files, e.g., `find /path/to/uploads -name '*.php'` or `grep -r 'eval($_GET' /path/to/uploads`, 3) Checking web server access logs for POST requests to "editproduct.php" with file uploads. However, no specific detection commands are provided in the resources. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Replacing the affected product with an alternative as no known countermeasures currently exist, 2) Implementing strict server-side validation of uploaded files by whitelisting allowed file extensions and MIME types, 3) Verifying actual file content using magic bytes or file signature checks to prevent spoofing, 4) Renaming uploaded files with randomized filenames and removing special characters, 5) Storing uploaded files outside the web root or in isolated directories protected by restrictive .htaccess rules, 6) Applying appropriate file permissions (e.g., 644 for files, 755 for directories), 7) Scanning uploaded files for malicious content using antivirus tools, 8) Enforcing file size and dimension limits to prevent resource exhaustion or denial-of-service, 9) Adding security headers such as Content-Disposition: attachment and correct Content-Type, and 10) Keeping server components and libraries up to date and regularly auditing the upload functionality. These steps are critical to prevent exploitation and protect system security and data integrity. [1, 3, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart