Arbitrary File Upload in user_payment_update.php in SourceCodester Client Database Management System 1.0 allows unauthenticated users to upload arbitrary files via the uploaded_file_cancelled field. Due to the absence of proper file extension checks, MIME type validation, and authentication, attackers can upload executable PHP files to a web-accessible directory (/files/). This allows them to execute arbitrary commands remotely by accessing the uploaded script, resulting in full Remote Code Execution (RCE) without authentication.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/x6vrn/mitre/blob/main/CVE-2025-46191.md | Third Party Advisory |
https://portswigger.net/web-security/file-upload | Technical Description |
Configurations
History
22 May 2025, 18:52
Type | Values Removed | Values Added |
---|---|---|
First Time |
Lerouxyxchire client Database Management System
Lerouxyxchire |
|
References | () https://github.com/x6vrn/mitre/blob/main/CVE-2025-46191.md - Third Party Advisory | |
References | () https://portswigger.net/web-security/file-upload - Technical Description | |
CPE | cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:* |
09 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-09 17:15
Updated : 2025-05-22 18:52
NVD link : CVE-2025-46191
Mitre link : CVE-2025-46191
JSON object : View
Products Affected
lerouxyxchire
- client_database_management_system
CWE
No CWE.