CVE-2025-7175

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in code-projects E-Commerce Site 1.0 allows remote attackers to upload arbitrary files via the photo parameter in /admin/users_photo.php. This unrestricted file upload can lead to server compromise and data breaches. All installations of version 1.0 are affected.

💻 Affected Systems

Products:
  • code-projects E-Commerce Site
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with default configuration

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover via webshell upload leading to data exfiltration, ransomware deployment, or use as attack platform

🟠

Likely Case

Webshell installation allowing backdoor access, data theft, and further system compromise

🟢

If Mitigated

Limited impact if file uploads are properly restricted and monitored

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin access to /admin/users_photo.php

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider workarounds or migrating to supported software.

🔧 Temporary Workarounds

Restrict file uploads

all

Implement strict file type validation and size limits for uploads

Disable vulnerable endpoint

all

Block access to /admin/users_photo.php via web server configuration

# Apache: RewriteRule ^admin/users_photo\.php$ - [F]
# Nginx: location ~ ^/admin/users_photo\.php$ { return 403; }

🧯 If You Can't Patch

  • Implement web application firewall rules to block malicious file uploads
  • Restrict admin panel access to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check if /admin/users_photo.php exists and accepts file uploads without proper validation

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Test file upload functionality with malicious file types to ensure they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed upload attempts
  • Uploads of unusual file types (php, exe, etc.)
  • Access to uploaded files in unexpected locations

Network Indicators:

  • POST requests to /admin/users_photo.php with file uploads
  • Subsequent requests to uploaded malicious files

SIEM Query:

source="web_logs" AND (uri="/admin/users_photo.php" AND method="POST")

🔗 References

📤 Share & Export