CVE-2025-1166
SourceCodester Food Menu Manager update.php unrestricted upload
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability has been found in SourceCodester Food Menu Manager 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file endpoint/update.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
In SourceCodester Food Menu Manager 1.0 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei endpoint/update.php. Mittels dem Manipulieren mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-02-10 CVE Reserved
- 2025-02-11 CVE Published
- 2025-02-18 CVE Updated
- 2025-02-18 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-284: Improper Access Control
- CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://vuldb.com/?id.295069 | Vdb Entry | |
https://vuldb.com/?submit.494567 | Third Party Advisory | |
https://www.sourcecodester.com | Product |
URL | Date | SRC |
---|---|---|
https://gist.github.com/jmx0hxq/0ce2c97ca11b2423a203b5719438c9f8 | 2025-02-18 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
SourceCodester Search vendor "SourceCodester" | Food Menu Manager Search vendor "SourceCodester" for product "Food Menu Manager" | 1.0 Search vendor "SourceCodester" for product "Food Menu Manager" and version "1.0" | en |
Affected
|