CVE-2025-2973
Published: 31 March 2025
Summary
CVE-2025-2973 is a medium-severity Improper Access Control (CWE-284) vulnerability in Code-Projects College Management System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the unrestricted file upload flaw in /Admin/student.php by identifying, reporting, and correcting the vulnerability.
Validates the profile_image input parameter to reject unrestricted uploads of dangerous file types.
Detects and eradicates malicious code in uploaded profile_image files at system entry points.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload vulnerability in public-facing web application (/Admin/student.php) enables exploitation for initial access (T1190), deployment of web shells (T1505.003), and staging of malware/tools (T1608.001/.002), as confirmed by advisories noting RCE via uploaded Trojans.
NVD Description
A vulnerability, which was classified as critical, was found in code-projects College Management System 1.0. This affects an unknown part of the file /Admin/student.php. The manipulation of the argument profile_image leads to unrestricted upload. It is possible to initiate the…
more
attack remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2973 is a critical vulnerability in code-projects College Management System 1.0, affecting an unknown part of the file /Admin/student.php. The issue arises from manipulation of the profile_image argument, enabling unrestricted file upload. It was published on 2025-03-31 and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), with associated CWEs CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type).
A remote attacker with low privileges can exploit this vulnerability over the network with low complexity and no user interaction. Exploitation allows uploading arbitrary files, potentially compromising confidentiality, integrity, and availability to a low degree within the unchanged scope.
Advisories provide further details via VulDB entries (ctiid.302025, id.302025, submit.522478) and the vendor site at code-projects.org. A GitHub repository (hak0neP/cve/blob/main/cve-RCE.md) discloses the exploit publicly, indicating it may be used in attacks. No specific patches or mitigations are detailed in the CVE information.
The exploit disclosure heightens the risk for deployments of College Management System 1.0.
Details
- CWE(s)