Description
A security flaw has been discovered in projectworlds can pass malicious payloads up to 1.0. This vulnerability affects unknown code of the file /add_book.php. The manipulation of the argument image results in unrestricted upload. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
Problem types
Product status
Timeline
| 2025-11-23: | Advisory disclosed |
| 2025-11-23: | VulDB entry created |
| 2025-11-23: | VulDB entry last update |
Credits
GYSakura (VulDB User)
References
vuldb.com/?id.333337 (VDB-333337 | projectworlds can pass malicious payloads add_book.php unrestricted upload)
vuldb.com/?ctiid.333337 (VDB-333337 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.698646 (Submit #698646 | projectworlds Advanced Library Management System V1.0 Unrestricted Upload)
github.com/GYSakura/tmp75/blob/main/report.md