CVE-2025-4923

A vulnerability, which was classified as critical, has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /user_delivery_update.php. The manipulation of the argument uploaded_file_cancelled leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/akihi0342/cve/issues/1 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.309485 Permissions Required VDB Entry
https://vuldb.com/?id.309485 Third Party Advisory VDB Entry
https://vuldb.com/?submit.579104 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*

History

28 May 2025, 12:50

Type Values Removed Values Added
References () https://github.com/akihi0342/cve/issues/1 - () https://github.com/akihi0342/cve/issues/1 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.309485 - () https://vuldb.com/?ctiid.309485 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.309485 - () https://vuldb.com/?id.309485 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.579104 - () https://vuldb.com/?submit.579104 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product
CPE cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*
First Time Lerouxyxchire
Lerouxyxchire client Database Management System

19 May 2025, 13:35

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como crítica en SourceCodester Client Database Management System 1.0. Este problema afecta a un procesamiento desconocido del archivo /user_delivery_update.php. La manipulación del argumento uploaded_file_cancelled permite la carga sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

19 May 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-19 08:15

Updated : 2025-05-28 12:50


NVD link : CVE-2025-4923

Mitre link : CVE-2025-4923

CVE.ORG link : CVE-2025-4923


JSON object : View

Products Affected

lerouxyxchire

  • client_database_management_system
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type