CVE-2025-46191

Arbitrary File Upload in user_payment_update.php in SourceCodester Client Database Management System 1.0 allows unauthenticated users to upload arbitrary files via the uploaded_file_cancelled field. Due to the absence of proper file extension checks, MIME type validation, and authentication, attackers can upload executable PHP files to a web-accessible directory (/files/). This allows them to execute arbitrary commands remotely by accessing the uploaded script, resulting in full Remote Code Execution (RCE) without authentication.
CVSS

No CVSS.

References
Configurations

Configuration 1 (hide)

cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*

History

22 May 2025, 18:52

Type Values Removed Values Added
First Time Lerouxyxchire client Database Management System
Lerouxyxchire
References () https://github.com/x6vrn/mitre/blob/main/CVE-2025-46191.md - () https://github.com/x6vrn/mitre/blob/main/CVE-2025-46191.md - Third Party Advisory
References () https://portswigger.net/web-security/file-upload - () https://portswigger.net/web-security/file-upload - Technical Description
CPE cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*

09 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-09 17:15

Updated : 2025-05-22 18:52


NVD link : CVE-2025-46191

Mitre link : CVE-2025-46191


JSON object : View

Products Affected

lerouxyxchire

  • client_database_management_system
CWE

No CWE.