CVE-2025-6667

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in code-projects Car Rental System 1.0 allows remote attackers to upload arbitrary files via the /admin/add_cars.php endpoint. This unrestricted file upload can lead to remote code execution or system compromise. All users running Car Rental System 1.0 with the vulnerable admin interface exposed are affected.

💻 Affected Systems

Products:
  • code-projects Car Rental System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin interface access; default installations likely vulnerable if admin panel is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data theft, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Webshell upload allowing unauthorized access to the server, file system manipulation, and potential lateral movement within the network.

🟢

If Mitigated

File upload attempts are blocked or logged, preventing successful exploitation while maintaining system functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin access; public disclosure increases weaponization likelihood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Implement server-side validation to only allow specific image file types (jpg, png, gif) and verify file signatures.

Web Application Firewall Rules

all

Deploy WAF rules to block requests to /admin/add_cars.php with suspicious file uploads or non-image content.

🧯 If You Can't Patch

  • Restrict network access to admin interface using firewall rules or VPN.
  • Implement strict file upload validation and store uploaded files outside web root with random names.

🔍 How to Verify

Check if Vulnerable:

Check if /admin/add_cars.php exists and accepts file uploads without proper validation. Attempt to upload a non-image file with image extension.

Check Version:

Check application files or documentation for version 1.0 references.

Verify Fix Applied:

Test file upload functionality with various file types; only valid images should be accepted. Verify uploaded files cannot execute as code.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed upload attempts to /admin/add_cars.php
  • Successful uploads of non-image files or files with double extensions
  • Unusual file creation in upload directories

Network Indicators:

  • HTTP POST requests to /admin/add_cars.php with file uploads
  • Subsequent requests to uploaded files with executable extensions

SIEM Query:

source="web_logs" AND uri="/admin/add_cars.php" AND method="POST" AND (content_type="multipart/form-data" OR file_upload="true")

🔗 References

📤 Share & Export