CVE-2025-6843

7.3 HIGH

📋 TL;DR

CVE-2025-6843 is a critical unrestricted file upload vulnerability in Simple Photo Gallery 1.0 that allows remote attackers to upload arbitrary files to the server via the /upload-photo.php endpoint. This affects all users running Simple Photo Gallery 1.0 with the vulnerable upload functionality enabled.

💻 Affected Systems

Products:
  • Simple Photo Gallery
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the default installation with the upload-photo.php functionality accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through webshell upload leading to remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Webshell deployment allowing attackers to execute arbitrary commands, deface websites, or establish persistent backdoors.

🟢

If Mitigated

File uploads blocked or properly validated, preventing malicious file execution while maintaining legitimate functionality.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication and affects internet-facing web applications.
🏢 Internal Only: MEDIUM - Internal applications are still vulnerable but have reduced attack surface compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept is publicly available on GitHub, making exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider workarounds or migrating to alternative software.

🔧 Temporary Workarounds

Disable upload-photo.php

linux

Remove or rename the vulnerable upload-photo.php file to prevent exploitation.

mv /path/to/upload-photo.php /path/to/upload-photo.php.disabled
chmod 000 /path/to/upload-photo.php

Implement file upload validation

all

Add server-side validation to restrict file types, extensions, and content.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to upload-photo.php
  • Restrict network access to the application using firewall rules or network segmentation

🔍 How to Verify

Check if Vulnerable:

Check if upload-photo.php exists and accepts file uploads without proper validation.

Check Version:

Check application documentation or configuration files for version information.

Verify Fix Applied:

Test that upload-photo.php is inaccessible or properly validates file uploads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to upload-photo.php
  • POST requests with suspicious file extensions
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to /upload-photo.php with executable file extensions
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND uri="/upload-photo.php" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")

🔗 References

📤 Share & Export