CVE Alert: CVE-2025-10083 – SourceCodester – Pet Grooming Management Software

CVE-2025-10083

MEDIUMNo exploitation knownPoC observed

A vulnerability was determined in SourceCodester Pet Grooming Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/profile.php. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (6.3)
Vendor
SourceCodester
Product
Pet Grooming Management Software
Versions
1.0
CWE
CWE-434, Unrestricted Upload
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-08T04:32:06.956Z
Updated
2025-09-08T16:11:09.588Z

AI Summary Analysis

Risk verdict

Medium risk: remote, network-exposed unrestricted upload vulnerability with public disclosure and PoC, but exploitation requires low privilege and no user interaction; monitor closely for opportunistic attempts.

Why this matters

An unrestricted upload flaw can enable web shells or malicious files on the web server, potentially undermining confidentiality, integrity and availability of the grooming software and any adjacent systems. For small-to-medium deployments, successful abuse could allow persistence, data leakage (customer records) or site defacement without requiring user action.

Most likely attack path

Attacker scans for the admin/profile.php endpoint, exploits the upload weakness over the network, and places a malicious payload in the web-accessible area. Low-privilege access is required, but no user interaction is needed, enabling automated attempts to upload and execute. If a web shell is uploaded, the attacker may attempt further lateral movement within the host or to connected services.

Who is most exposed

Self-hosted instances on internet-facing web servers (common in small businesses) running PHP/LAMP stacks are most at risk; any installation exposing the admin/profile.php endpoint without strong access controls is a prime target.

Detection ideas

  • Unusual POST requests to admin/profile.php with multipart/form-data.
  • New or modified files in web-access/upload directories.
  • PHP/OS shell indicators, unexpected file types, or executable code in uploads.
  • Anomalous web server errors or spikes in file-uploads and execution events.
  • IOCs from public advisories or CTI feeds about this vulnerability.

Mitigation and prioritisation

  • Apply the vendor patch or upgrade to a non-affected version as soon as available.
  • If patching is delayed, disable or restrict access to the upload endpoint; require authentication and implement strict input validation.
  • Enforce whitelisted file types, store uploads outside the web root, and disable PHP execution in the uploads directory.
  • Implement a web application firewall rule set to block unrestricted uploads and monitor for anomalous upload activity.
  • Change-management: plan a test in staging, then patch in a defined maintenance window; verify no regression in admin functions.
  • Treat as priority 1 if KEV is confirmed or EPSS ≥ 0.5.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.