CVE-2025-70146

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to perform administrative operations without authentication in ProjectWorlds Online Time Table Generator 1.0. Attackers can add, delete, or modify records by directly accessing administrative scripts. All users running the vulnerable version are affected.

💻 Affected Systems

Products:
  • ProjectWorlds Online Time Table Generator
Versions: 1.0
Operating Systems: Any OS running PHP/MySQL web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of version 1.0 with the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the application with unauthorized data manipulation, deletion of all records, or injection of malicious content affecting users.

🟠

Likely Case

Unauthorized modification or deletion of timetable data, potentially disrupting operations or causing data loss.

🟢

If Mitigated

No impact if proper authentication controls are implemented or the vulnerable endpoints are restricted.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests to vulnerable /admin/ endpoints without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider implementing authentication checks or upgrading if a patched version becomes available.

🔧 Temporary Workarounds

Implement Authentication Middleware

all

Add authentication checks to all /admin/ scripts to verify valid user sessions before processing requests.

Modify PHP scripts in /admin/ directory to include session validation

Restrict Access via Web Server

linux

Use web server configuration to restrict access to /admin/ directory to authorized IP addresses only.

For Apache: Use .htaccess with Require ip directives
For Nginx: Use allow/deny directives in location block

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to the /admin/ directory
  • Monitor and log all access attempts to /admin/ endpoints for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Attempt to access /admin/ endpoints without authentication. If administrative operations succeed, the system is vulnerable.

Check Version:

Check the application's version file or documentation, typically in README or config files.

Verify Fix Applied:

Verify that accessing /admin/ endpoints without valid authentication returns an error or redirects to login.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /admin/ endpoints without corresponding authentication/session logs
  • Unusual administrative operations from unexpected IP addresses

Network Indicators:

  • HTTP POST/GET requests to /admin/ scripts without authentication headers

SIEM Query:

source="web_server_logs" AND uri_path="/admin/*" AND NOT (user_session="valid" OR auth_status="success")

🔗 References

📤 Share & Export