Arbitrary File Upload in user_payment_update.php in SourceCodester Client Database Management System 1.0 allows unauthenticated users to upload arbitrary files via the uploaded_file_cancelled field. Due to the absence of proper file extension checks, MIME type validation, and authentication, attackers can upload executable PHP files to a web-accessible directory (/files/). This allows them to execute arbitrary commands remotely by accessing the uploaded script, resulting in full Remote Code Execution (RCE) without authentication.
Metrics
Affected Vendors & Products
References
History
Thu, 22 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lerouxyxchire
Lerouxyxchire client Database Management System |
|
CPEs | cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Lerouxyxchire
Lerouxyxchire client Database Management System |
Sat, 10 May 2025 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-94 | |
Metrics |
cvssV3_1
|
Fri, 09 May 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Arbitrary File Upload in user_payment_update.php in SourceCodester Client Database Management System 1.0 allows unauthenticated users to upload arbitrary files via the uploaded_file_cancelled field. Due to the absence of proper file extension checks, MIME type validation, and authentication, attackers can upload executable PHP files to a web-accessible directory (/files/). This allows them to execute arbitrary commands remotely by accessing the uploaded script, resulting in full Remote Code Execution (RCE) without authentication. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-05-09T00:00:00.000Z
Updated: 2025-05-10T01:57:45.325Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-46191

Updated: 2025-05-10T01:57:21.650Z

Status : Analyzed
Published: 2025-05-09T17:15:51.480
Modified: 2025-05-22T18:52:07.867
Link: CVE-2025-46191

No data.