CVE-2025-3040

6.3 MEDIUM

📋 TL;DR

CVE-2025-3040 is a critical unrestricted file upload vulnerability in Project Worlds Online Time Table Generator 1.0. Attackers can remotely upload malicious files via the /admin/add_student.php endpoint's 'pic' parameter, potentially leading to server compromise. Organizations using this software are affected.

💻 Affected Systems

Products:
  • Project Worlds Online Time Table Generator
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /admin/add_student.php endpoint to be accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data theft, or ransomware deployment

🟠

Likely Case

Webshell upload enabling persistent backdoor access and data exfiltration

🟢

If Mitigated

File upload blocked or sanitized, limiting impact to failed upload attempts

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing instances extremely vulnerable
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details publicly disclosed on GitHub; simple file upload manipulation required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider removing or replacing the software entirely.

🔧 Temporary Workarounds

Block access to vulnerable endpoint

all

Restrict access to /admin/add_student.php via web server configuration

# Apache: RewriteRule ^admin/add_student\.php$ - [F]
# Nginx: location ~ /admin/add_student\.php$ { deny all; }

Implement file upload restrictions

all

Add server-side validation for file uploads (extension, MIME type, size)

🧯 If You Can't Patch

  • Remove or disable the Online Time Table Generator application
  • Implement network segmentation and restrict access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check if /admin/add_student.php exists and accepts file uploads without proper validation

Check Version:

Check application version in source code or documentation

Verify Fix Applied:

Attempt to upload a malicious file (e.g., .php shell) and verify it's rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /admin/add_student.php
  • Uploads of executable file types (.php, .exe, .jsp)

Network Indicators:

  • POST requests to /admin/add_student.php with file uploads
  • Subsequent suspicious requests to uploaded files

SIEM Query:

web.url = "*/admin/add_student.php*" AND http.method = POST AND http.content_type contains "multipart/form-data"

🔗 References

📤 Share & Export