CVE Alert: CVE-2025-10085 – SourceCodester – Pet Grooming Management Software
CVE-2025-10085
A security flaw has been discovered in SourceCodester Pet Grooming Management Software 1.0. This vulnerability affects unknown code of the file manage_website.php. The manipulation results in unrestricted upload. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI Summary Analysis
Risk verdict
High risk: remote, network-based unrestricted upload with a PoC available; treat as urgent for exposed deployments, while awaiting EPSS/KEV/SSVC confirmation.
Why this matters
Unrestricted upload can enable remote code execution, shell access or web defacement, with potential data exposure and application/network compromise. The PoC existence and network access vector raise the likelihood of automated exploitation against internet-facing instances or poorly secured deployments.
Most likely attack path
An attacker can reach manage_website.php over the network, trigger an upload without user interaction, and place a malicious file in or near the web root. With low privileges required and no UI interaction, successful upload could enable further abuse within the server’s scope, potentially compromising confidentiality, integrity and availability of the hosting environment.
Who is most exposed
Typically exposed, self-hosted instances running on small-to-mid sized organisations’ web infrastructure (LAMP/LEMP stacks) with internet exposure and lax upload controls. On-premise or hosted environments with default configurations are at higher risk.
Detection ideas
- Sudden spikes in file uploads to web-accessible directories.
- New or renamed PHP files appearing in upload or web root.
- Anomalous POST requests to manage_website.php or upload endpoints.
- Web shell or suspicious file activity detected by web logs/IDS.
- Post-exploitation indicators: unusual outbound connections, new user/admin activity after an upload.
Mitigation and prioritisation
- Apply vendor patch or upgrade to an unaffected release; verify in test env before production.
- If patching is not feasible, disable or tightly restrict unrestricted upload in manage_website.php; enforce authentication and least privilege.
- Implement strict file-type/size validation, direct uploads to non-web root locations, and rename uploaded files; enforce content-type checks.
- WAF/IPS rules to block unrestricted upload patterns; monitor for attempted exploit traffic.
- Change-management: deploy in a staged manner with backups and rollback plan.
- If KEV true or EPSS ≥ 0.5, treat as priority 1; otherwise, escalate to high priority for exposed deployments and perform rapid risk assessment.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.