A vulnerability has been found in SourceCodester Food Menu Manager 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file endpoint/update.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://gist.github.com/jmx0hxq/0ce2c97ca11b2423a203b5719438c9f8 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.295069 | Permissions Required VDB Entry |
| https://vuldb.com/?id.295069 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.494567 | Third Party Advisory VDB Entry |
| https://www.sourcecodester.com/ | Product |
Configurations
History
01 Aug 2025, 01:59
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Remyandrade food Menu Manager
Remyandrade |
|
| CPE | cpe:2.3:a:remyandrade:food_menu_manager:1.0:*:*:*:*:*:*:* |
14 May 2025, 21:17
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Rems food Menu Manager
Rems |
|
| CPE | cpe:2.3:a:rems:food_menu_manager:1.0:*:*:*:*:*:*:* | |
| References | () https://www.sourcecodester.com/ - Product | |
| References | () https://vuldb.com/?id.295069 - Third Party Advisory, VDB Entry | |
| References | () https://gist.github.com/jmx0hxq/0ce2c97ca11b2423a203b5719438c9f8 - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.295069 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?submit.494567 - Third Party Advisory, VDB Entry |
11 Feb 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-11 02:15
Updated : 2025-08-01 01:59
NVD link : CVE-2025-1166
Mitre link : CVE-2025-1166
JSON object : View
Products Affected
remyandrade
- food_menu_manager
