CVE-2026-5670
Unrestricted File Upload in Cyber-III Student-Management-System
Publication date: 2026-04-06
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| cyber-iii | student-management-system | to 1a938fa61e9f735078e9b291d2e6215b4942af3f (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unrestricted file upload through the move_uploaded_file function in the Cyber-III Student-Management-System, which can lead to remote code execution. Such a security flaw can potentially result in unauthorized access to sensitive data or system compromise.
This kind of vulnerability may impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches. If exploited, it could lead to data breaches or unauthorized data manipulation, thereby violating these regulations.
However, the provided information does not explicitly state the direct impact on compliance or mention any specific regulatory consequences.
Can you explain this vulnerability to me?
This vulnerability exists in the Cyber-III Student-Management-System, specifically in the move_uploaded_file function within the /AssignmentSection/submission/upload.php file. It allows an attacker to manipulate the file argument to perform an unrestricted file upload.
Because the upload is unrestricted, an attacker can upload malicious files remotely, potentially leading to remote code execution on the server.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to upload arbitrary files to the server without restriction. This can lead to remote code execution, where the attacker can run malicious code on the server.
Such an exploit can compromise the integrity, confidentiality, and availability of the system, potentially leading to data breaches, unauthorized access, or disruption of services.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves unrestricted file upload through the move_uploaded_file function in /AssignmentSection/submission/upload.php. Detection can focus on monitoring for unusual file upload activity or attempts to upload executable files to this endpoint.
You can detect potential exploitation by checking web server logs for POST requests to /AssignmentSection/submission/upload.php with suspicious file types or filenames.
Example commands to detect suspicious uploads include:
- Using grep to find upload attempts in web server logs: grep "/AssignmentSection/submission/upload.php" /var/log/apache2/access.log
- Searching for potentially malicious file extensions in uploaded files directory: find /path/to/uploads -type f \( -name "*.php" -o -name "*.phtml" -o -name "*.exe" \)
- Monitoring real-time uploads with: tail -f /var/log/apache2/access.log | grep "/AssignmentSection/submission/upload.php"
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting file uploads to only allow safe file types and validating the uploaded files thoroughly.
You should implement server-side checks to validate file types and sizes, and avoid using move_uploaded_file without proper validation.
Additionally, restrict permissions on the upload directory to prevent execution of uploaded files.
If possible, temporarily disable the upload functionality until a patch or fix is available.
Monitor the system for any signs of exploitation and apply any updates or patches once released by the vendor.