code-projects Kitchen Treasure 1.0 /userregistration.php photo gwirioù astennet

Ur gwallzarvoud renket evel kritikel zo bet kavet e code-projects Kitchen Treasure 1.0. Kement-se a denn da ur fonksion dianav eus ar restr /userregistration.php. Ar c'hemmadur eus an arguzenn photo a gas da gwirioù astennet. Arverañ CWE evit embann ar gudenn a gas da CWE-434. Ar gwallgornad zo bet embannet 02/08/2025. An aliadenn a zo rannet evit pellgargañ war github.com. Ar breskder-se a vez gwerzhet dindan an anv CVE-2025-8504. Emañ ar galloud da lakaat an dagadenn da sevel a-bell. Emaez ez eus titouroù teknikel. Atav, ur mod da implijout an dra-se a zo. An diskoulm zo bet embannet d'ar boblañs ha gallout a ra bezañ implijet. Bremañ emañ priz an exploit might be approx. USD $0-$5k war an amzer-mañ. Disklêriet eo evel test-kas ouzhpenn. Posupl eo pellgargañ an exploit e github.com. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

5 Daskemmoù · 99 Poentoù roadennoù

MaezKrouet
02/08/2025 09:06
Hizivadur 1/4
03/08/2025 10:37
Hizivadur 2/4
03/08/2025 11:08
Hizivadur 3/4
04/08/2025 15:25
Hizivadur 4/4
08/08/2025 19:48
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_vendorcode-projectscode-projectscode-projectscode-projectscode-projects
software_nameKitchen TreasureKitchen TreasureKitchen TreasureKitchen TreasureKitchen Treasure
software_version1.01.01.01.01.0
software_file/userregistration.php/userregistration.php/userregistration.php/userregistration.php/userregistration.php
software_argumentphotophotophotophotophoto
vulnerability_cweCWE-434 (gwirioù astennet)CWE-434 (gwirioù astennet)CWE-434 (gwirioù astennet)CWE-434 (gwirioù astennet)CWE-434 (gwirioù astennet)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4https://github.com/freshfish-hust/my-cves/issues/4
source_cveCVE-2025-8504CVE-2025-8504CVE-2025-8504CVE-2025-8504CVE-2025-8504
cna_responsibleVulDBVulDBVulDBVulDBVulDB
software_typeProject Management SoftwareProject Management SoftwareProject Management SoftwareProject Management SoftwareProject Management Software
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_prLLLLL
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_prLLLLL
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore6.56.56.56.56.5
cvss2_vuldb_tempscore5.65.65.65.65.6
cvss3_vuldb_basescore6.36.36.36.36.3
cvss3_vuldb_tempscore5.75.75.75.75.7
cvss3_meta_basescore6.36.36.36.37.5
cvss3_meta_tempscore5.76.06.06.07.3
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1754085600 (02/08/2025)1754085600 (02/08/2025)1754085600 (02/08/2025)1754085600 (02/08/2025)1754085600 (02/08/2025)
cve_nvd_summaryA vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.A vulnerability, which was classified as critical, was found in code-projects Kitchen Treasure 1.0. This affects an unknown part of the file /userregistration.php. The manipulation of the argument photo leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avNNNN
cvss4_cna_acLLLL
cvss4_cna_atNNNN
cvss4_cna_prLLLL
cvss4_cna_uiNNNN
cvss4_cna_vcLLLL
cvss4_cna_viLLLL
cvss4_cna_vaLLLL
cvss4_cna_scNNNN
cvss4_cna_siNNNN
cvss4_cna_saNNNN
cvss4_cna_bscore5.35.35.35.3
cvss3_cna_avNNNN
cvss3_cna_acLLLL
cvss3_cna_prLLLL
cvss3_cna_uiNNNN
cvss3_cna_sUUUU
cvss3_cna_cLLLL
cvss3_cna_iLLLL
cvss3_cna_aLLLL
cvss3_cna_basescore6.36.36.36.3
cvss2_cna_avNNNN
cvss2_cna_acLLLL
cvss2_cna_auSSSS
cvss2_cna_ciPPPP
cvss2_cna_iiPPPP
cvss2_cna_aiPPPP
cvss2_cna_basescore6.56.56.56.5
euvd_idEUVD-2025-23472EUVD-2025-23472EUVD-2025-23472
cve_nvd_summaryesSe encontró una vulnerabilidad clasificada como crítica en code-projects Kitchen Treasure 1.0. Esta afecta a una parte desconocida del archivo /userregistration.php. La manipulación del argumento "photo" permite la subida sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.Se encontró una vulnerabilidad clasificada como crítica en code-projects Kitchen Treasure 1.0. Esta afecta a una parte desconocida del archivo /userregistration.php. La manipulación del argumento "photo" permite la subida sin restricciones. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore9.8

Do you know our Splunk app?

Download it now for free!