CVE Alert: CVE-2025-10085 – SourceCodester – Pet Grooming Management Software

CVE-2025-10085

MEDIUMNo exploitation knownPoC observed

A security flaw has been discovered in SourceCodester Pet Grooming Management Software 1.0. This vulnerability affects unknown code of the file manage_website.php. The manipulation results in unrestricted upload. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

CVSS v3.1 (6.3)
Vendor
SourceCodester
Product
Pet Grooming Management Software
Versions
1.0
CWE
CWE-434, Unrestricted Upload
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-08T05:32:06.887Z
Updated
2025-09-08T18:25:39.682Z

AI Summary Analysis

Risk verdict

High risk: remote, network-based unrestricted upload with a PoC available; treat as urgent for exposed deployments, while awaiting EPSS/KEV/SSVC confirmation.

Why this matters

Unrestricted upload can enable remote code execution, shell access or web defacement, with potential data exposure and application/network compromise. The PoC existence and network access vector raise the likelihood of automated exploitation against internet-facing instances or poorly secured deployments.

Most likely attack path

An attacker can reach manage_website.php over the network, trigger an upload without user interaction, and place a malicious file in or near the web root. With low privileges required and no UI interaction, successful upload could enable further abuse within the server’s scope, potentially compromising confidentiality, integrity and availability of the hosting environment.

Who is most exposed

Typically exposed, self-hosted instances running on small-to-mid sized organisations’ web infrastructure (LAMP/LEMP stacks) with internet exposure and lax upload controls. On-premise or hosted environments with default configurations are at higher risk.

Detection ideas

  • Sudden spikes in file uploads to web-accessible directories.
  • New or renamed PHP files appearing in upload or web root.
  • Anomalous POST requests to manage_website.php or upload endpoints.
  • Web shell or suspicious file activity detected by web logs/IDS.
  • Post-exploitation indicators: unusual outbound connections, new user/admin activity after an upload.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to an unaffected release; verify in test env before production.
  • If patching is not feasible, disable or tightly restrict unrestricted upload in manage_website.php; enforce authentication and least privilege.
  • Implement strict file-type/size validation, direct uploads to non-web root locations, and rename uploaded files; enforce content-type checks.
  • WAF/IPS rules to block unrestricted upload patterns; monitor for attempted exploit traffic.
  • Change-management: deploy in a staged manner with backups and rollback plan.
  • If KEV true or EPSS ≥ 0.5, treat as priority 1; otherwise, escalate to high priority for exposed deployments and perform rapid risk assessment.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.