CVE-2025-10424

7.3 HIGH

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to the 1000projects Online Student Project Report Submission and Evaluation System 1.0 via the new_image parameter in faculty_controller.php. This can lead to remote code execution or system compromise. Organizations using this specific software version are affected.

💻 Affected Systems

Products:
  • 1000projects Online Student Project Report Submission and Evaluation System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin controller file specifically; requires web server with PHP support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data theft, or ransomware deployment.

🟠

Likely Case

Webshell upload enabling persistent access, data exfiltration, or lateral movement within the network.

🟢

If Mitigated

File upload blocked or restricted to safe extensions only, preventing exploitation.

🌐 Internet-Facing: HIGH - Attack can be carried out remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit, but remote access increases exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details publicly disclosed; simple file upload manipulation required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider workarounds or replacing the software.

🔧 Temporary Workarounds

Restrict file uploads in web server

all

Configure web server to block uploads to /admin/controller/faculty_controller.php or restrict file types.

# Apache: Add to .htaccess
<Files "faculty_controller.php">
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /admin/controller/faculty_controller.php {
    deny all;
}

Implement file validation

all

Add server-side validation to restrict uploaded files to specific extensions (e.g., .jpg, .png).

# Example PHP validation snippet
$allowed = ['jpg', 'png', 'gif'];
$ext = strtolower(pathinfo($_FILES['new_image']['name'], PATHINFO_EXTENSION));
if (!in_array($ext, $allowed)) {
    die('Invalid file type');
}

🧯 If You Can't Patch

  • Isolate the system on a segmented network with strict firewall rules.
  • Implement web application firewall (WAF) rules to block malicious file uploads.

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a file with arbitrary extension via the new_image parameter to /admin/controller/faculty_controller.php.

Check Version:

Check software documentation or interface for version information; typically displayed in admin panel.

Verify Fix Applied:

Test that file uploads are restricted to safe extensions or blocked entirely.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to faculty_controller.php
  • POST requests with file uploads to admin paths
  • Files with suspicious extensions (e.g., .php, .exe) in upload directories

Network Indicators:

  • HTTP POST requests to /admin/controller/faculty_controller.php with file uploads
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND uri="/admin/controller/faculty_controller.php" AND method="POST" AND file_upload="true"

🔗 References

📤 Share & Export