CVE-2025-6900

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in code-projects Library System 1.0 allows remote attackers to upload arbitrary files via the /add-book.php endpoint's image parameter. This can lead to remote code execution, data theft, or complete system compromise. All installations of Library System 1.0 with the vulnerable file accessible are affected.

💻 Affected Systems

Products:
  • code-projects Library System
Versions: 1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Any installation with /add-book.php accessible is vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data exfiltration, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Webshell upload enabling unauthorized access, file manipulation, and potential lateral movement within the network.

🟢

If Mitigated

File upload attempts blocked or quarantined with no successful exploitation.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely without authentication, making exposed systems immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. Simple file upload manipulation required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates. Consider implementing workarounds or replacing software.

🔧 Temporary Workarounds

Restrict File Uploads

all

Implement strict file upload validation including file type checking, size limits, and content verification

Disable /add-book.php

linux

Temporarily disable or restrict access to the vulnerable endpoint

# Apache: RewriteRule ^/add-book\.php$ - [F,L]
# Nginx: location ~ /add-book\.php$ { deny all; }

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file uploads
  • Isolate the system in a restricted network segment with strict outbound filtering

🔍 How to Verify

Check if Vulnerable:

Check if /add-book.php exists and accepts file uploads without proper validation. Test with controlled file upload attempts.

Check Version:

Check application files or documentation for version information. No standard command available.

Verify Fix Applied:

Attempt to upload malicious files (e.g., .php, .exe) to /add-book.php and verify they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /add-book.php
  • Large number of upload attempts
  • Uploads of executable file types

Network Indicators:

  • POST requests to /add-book.php with file uploads
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND uri="/add-book.php" AND method="POST" AND (file_extension="php" OR file_extension="exe" OR file_extension="sh")

🔗 References

📤 Share & Export