CVE-2026-2213

4.7 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to the Online Music Site 1.0 web application via the /Administrator/PHP/AdminAddAlbum.php endpoint. Attackers can exploit this to upload malicious files like webshells, potentially leading to server compromise. All users running the affected software are vulnerable.

💻 Affected Systems

Products:
  • code-projects Online Music Site
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /Administrator/PHP/AdminAddAlbum.php file to be accessible

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover via webshell upload leading to data theft, ransomware deployment, or use as attack platform

🟠

Likely Case

Unauthorized file upload leading to defacement, data manipulation, or limited server access

🟢

If Mitigated

File upload blocked or restricted to safe types only

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication
🏢 Internal Only: MEDIUM - Internal attackers could still exploit but requires network access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available and simple to execute

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider workarounds or alternative software.

🔧 Temporary Workarounds

Restrict file uploads

all

Implement server-side validation to only allow specific safe file types (e.g., .jpg, .png) and block executable extensions

Disable vulnerable endpoint

all

Block access to /Administrator/PHP/AdminAddAlbum.php via web server configuration

# Apache: Add to .htaccess
<Files "AdminAddAlbum.php">
    Order allow,deny
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /Administrator/PHP/AdminAddAlbum\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file uploads
  • Restrict network access to the application to trusted users only

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a file with arbitrary extension to /Administrator/PHP/AdminAddAlbum.php endpoint

Check Version:

Check application version in source code or documentation

Verify Fix Applied:

Test that file uploads are properly restricted and malicious files are rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to AdminAddAlbum.php
  • Uploads of non-image file types
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to /Administrator/PHP/AdminAddAlbum.php with file uploads
  • Subsequent requests to uploaded malicious files

SIEM Query:

source="web_logs" AND uri="/Administrator/PHP/AdminAddAlbum.php" AND method="POST" AND file_upload="true"

🔗 References

📤 Share & Export