CVE-2025-8435

7.3 HIGH

📋 TL;DR

CVE-2025-8435 is a critical missing authorization vulnerability in code-projects Online Movie Streaming 1.0 that allows attackers to bypass authentication on the /admin-control.php endpoint by manipulating the ID parameter. This affects all installations of the vulnerable software version. Remote attackers can exploit this to gain unauthorized administrative access.

💻 Affected Systems

Products:
  • code-projects Online Movie Streaming
Versions: 1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable. The /admin-control.php file must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the web application allowing attackers to modify content, access user data, upload malicious files, or pivot to underlying systems.

🟠

Likely Case

Unauthorized administrative access leading to content manipulation, user data exposure, and potential defacement.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring in place.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing web applications.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires simple HTTP requests with manipulated ID parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Implement Proper Authorization

all

Add authentication checks to /admin-control.php to verify user has admin privileges before processing requests.

Edit /admin-control.php to include session validation and role checking

Restrict Access via Web Server

all

Use web server configuration to restrict access to /admin-control.php to authorized IP addresses only.

# Apache: <Location /admin-control.php> Require ip 192.168.1.0/24 </Location>
# Nginx: location /admin-control.php { allow 192.168.1.0/24; deny all; }

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block unauthorized access to /admin-control.php
  • Monitor access logs for suspicious requests to /admin-control.php and implement alerting

🔍 How to Verify

Check if Vulnerable:

Attempt to access /admin-control.php?ID=[any_value] without authentication. If it returns admin functionality, the system is vulnerable.

Check Version:

Check the software version in the application interface or configuration files.

Verify Fix Applied:

After implementing fixes, verify that unauthenticated requests to /admin-control.php return authentication errors or are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to /admin-control.php with ID parameter
  • Multiple failed authentication attempts followed by successful /admin-control.php access

Network Indicators:

  • HTTP requests to /admin-control.php from unexpected IP addresses
  • Unusual patterns of requests to administrative endpoints

SIEM Query:

source="web_logs" AND (uri="/admin-control.php" AND NOT (user_agent="monitoring_tool" OR src_ip IN [allowed_ips]))

🔗 References

📤 Share & Export