CVE Alert: CVE-2025-11347 – code-projects – Student Crud Operation

CVE-2025-11347

HIGHNo exploitation known

A vulnerability was found in code-projects Student Crud Operation up to 3.3. This vulnerability affects the function move_uploaded_file of the file add.php of the component Add Student Page/Edit Student Page. Performing manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Student Crud Operation
Versions
3.0 | 3.1 | 3.2 | 3.3
CWE
CWE-434, Unrestricted Upload
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-07T02:48:36.596Z
Updated
2025-10-07T02:48:36.596Z

AI Summary Analysis

**Risk verdict**: High risk due to remote, unauthenticated arbitrary file upload that can yield remote code execution; public exploit guidance increases likelihood of opportunistic attacks.

**Why this matters**: An attacker could upload and execute a malicious script on the server, gaining control, exfiltrating data, or pivoting to other systems. The business impact includes possible downtime, data loss, and damages to trust and regulatory standing.

**Most likely attack path**: An attacker submits a crafted file via the Add Student Page/Edit Student Page without authentication (AV:N, PR:N, UI:N). The uploaded payload lands in a web-accessible area and, if not properly validated, may be executed by the server, enabling RCE with the web app’s privileges. No user interaction is required, and the impact scales with the app’s access.

**Who is most exposed**: Organisations hosting this PHP component on internet-facing stacks with writable upload directories and weak server hardening are most at risk, particularly where uploads are not isolated from the webroot or executable.

**Detection ideas**:

  • New executable-looking files appearing in the uploads path shortly after upload attempts.
  • PHP/Apache/Nginx error or access logs showing execution attempts of recently uploaded content.
  • Unauthenticated or unusual upload requests to add.php, especially with executable extensions.
  • WAF alerts for unrestricted file upload patterns or anomalous content types.
  • Post-upload requests triggering server-side script execution.

**Mitigation and prioritisation**:

  • Apply vendor patch or upgrade to the latest release; if unavailable, apply compensating controls immediately.
  • Disable unrestricted uploads; implement strict allowlists (only non-executable types) and rename sanitisations.
  • Store uploads outside the webroot and configure the server to disallow execution in the upload directory.
  • Enforce authentication and strict access controls on upload endpoints; enable CSRF protection and rate limiting.
  • Validate and scan uploads server-side; monitor for anomalous activity; plan staged patching and testing before production.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.