Home

Description

Arbitrary File Upload in user_payment_update.php in SourceCodester Client Database Management System 1.0 allows unauthenticated users to upload arbitrary files via the uploaded_file_cancelled field. Due to the absence of proper file extension checks, MIME type validation, and authentication, attackers can upload executable PHP files to a web-accessible directory (/files/). This allows them to execute arbitrary commands remotely by accessing the uploaded script, resulting in full Remote Code Execution (RCE) without authentication.

PUBLISHED Reserved 2025-04-22 | Published 2025-05-09 | Updated 2025-05-10 | Assigner mitre

References

portswigger.net/web-security/file-upload

github.com/x6vrn/mitre/blob/main/CVE-2025-46191.md

cve.org (CVE-2025-46191)

nvd.nist.gov (CVE-2025-46191)

Download JSON