CVE-2026-5670
Received Received - Intake
Unrestricted File Upload in Cyber-III Student-Management-System

Publication date: 2026-04-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This issue affects the function move_uploaded_file of the file /AssignmentSection/submission/upload.php. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
cyber-iii student-management-system to 1a938fa61e9f735078e9b291d2e6215b4942af3f (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unrestricted file upload through the move_uploaded_file function in the Cyber-III Student-Management-System, which can lead to remote code execution. Such a security flaw can potentially result in unauthorized access to sensitive data or system compromise.

This kind of vulnerability may impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches. If exploited, it could lead to data breaches or unauthorized data manipulation, thereby violating these regulations.

However, the provided information does not explicitly state the direct impact on compliance or mention any specific regulatory consequences.


Can you explain this vulnerability to me?

This vulnerability exists in the Cyber-III Student-Management-System, specifically in the move_uploaded_file function within the /AssignmentSection/submission/upload.php file. It allows an attacker to manipulate the file argument to perform an unrestricted file upload.

Because the upload is unrestricted, an attacker can upload malicious files remotely, potentially leading to remote code execution on the server.


How can this vulnerability impact me? :

The vulnerability can allow an attacker to upload arbitrary files to the server without restriction. This can lead to remote code execution, where the attacker can run malicious code on the server.

Such an exploit can compromise the integrity, confidentiality, and availability of the system, potentially leading to data breaches, unauthorized access, or disruption of services.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves unrestricted file upload through the move_uploaded_file function in /AssignmentSection/submission/upload.php. Detection can focus on monitoring for unusual file upload activity or attempts to upload executable files to this endpoint.

You can detect potential exploitation by checking web server logs for POST requests to /AssignmentSection/submission/upload.php with suspicious file types or filenames.

Example commands to detect suspicious uploads include:

  • Using grep to find upload attempts in web server logs: grep "/AssignmentSection/submission/upload.php" /var/log/apache2/access.log
  • Searching for potentially malicious file extensions in uploaded files directory: find /path/to/uploads -type f \( -name "*.php" -o -name "*.phtml" -o -name "*.exe" \)
  • Monitoring real-time uploads with: tail -f /var/log/apache2/access.log | grep "/AssignmentSection/submission/upload.php"

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting file uploads to only allow safe file types and validating the uploaded files thoroughly.

You should implement server-side checks to validate file types and sizes, and avoid using move_uploaded_file without proper validation.

Additionally, restrict permissions on the upload directory to prevent execution of uploaded files.

If possible, temporarily disable the upload functionality until a patch or fix is available.

Monitor the system for any signs of exploitation and apply any updates or patches once released by the vendor.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart