CVE-2025-14582
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-12

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in campcodes Online Student Enrollment System 1.0. This affects an unknown function of the file /admin/index.php?page=user-profile. Performing a manipulation of the argument userphoto results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-12
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
campcodes online_student_enrollment_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in campcodes Online Student Enrollment System 1.0, specifically in the /admin/index.php?page=user-profile file. It allows an attacker to manipulate the 'userphoto' argument to perform an unrestricted file upload. This means an attacker can remotely upload potentially malicious files without proper restrictions.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to upload malicious files remotely, which could lead to unauthorized access, data modification, or disruption of the system's availability. This could compromise the integrity, confidentiality, and availability of the affected system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers to upload malicious scripts and gain full control over the affected system, leading to potential theft of sensitive data, including user information and database configuration files. Such unauthorized access and data breaches can result in non-compliance with data protection regulations like GDPR and HIPAA, which mandate the protection of personal and sensitive data. Therefore, exploitation of this vulnerability poses a significant risk to compliance with these standards due to potential confidentiality, integrity, and availability violations. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by monitoring for suspicious file uploads and web requests targeting the /admin/index.php?page=user-profile endpoint, especially those attempting to upload PHP scripts. Look for POST requests with multipart/form-data containing files with .php extensions or payloads including PHP code such as `<?php @eval($_POST['shell']); ?>`. Commands to detect such activity include using web server logs to grep for uploads of .php files or suspicious POST parameters. For example, on a Linux server, you can run: `grep -i 'POST' /var/log/apache2/access.log | grep 'user-profile' | grep '.php'` to find attempts to upload PHP files. Additionally, monitoring for usage of dangerous PHP functions like eval or base64_decode in web directories can be done by scanning PHP files or using tools like grep: `grep -r --include=*.php -E 'eval|base64_decode' /var/www/html/uploads/`. Deploying Web Application Firewall (WAF) rules to detect AntSword webshell payloads and monitoring for POST parameters starting with AntSword’s Base64 prefix can also help detect exploitation attempts. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include blocking uploads of PHP scripts via web server configuration. For example, in Apache, add the following directive to deny execution of PHP files in upload directories: `<FilesMatch "\.(php|php3|php5|phtml)$"> Require all denied </FilesMatch>`. Deploy Web Application Firewall (WAF) rules to detect and block AntSword-specific payloads, such as those containing `eval(base64_decode` or POST parameters starting with AntSword’s Base64 prefix. Additionally, restrict file uploads to only allow image file extensions (.jpg, .png) and verify actual file formats using functions like `getimagesize()`. Rename uploaded files with UUIDs and store them in non-web-accessible directories. Configure upload directories to disallow execution of PHP files (e.g., Nginx rule: `location ~ \.php$ { deny all; }`). Monitor and log suspicious requests containing dangerous functions like `eval` and `base64_decode`. These steps help prevent attackers from uploading and executing malicious PHP scripts and gaining control over the system. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart