Cyber Posture

CVE-2025-9476

HighPublic PoC

Published: 26 August 2025

Published
26 August 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0013 32.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-9476 is a high-severity Improper Access Control (CWE-284) vulnerability in Nelzkie15 Human Resource Information System. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-284 CWE-434

This control enforces ownership-based restrictions on portable storage device use, directly implementing access control over media insertion into organizational systems.

addresses: CWE-284 CWE-434

Hardware write-protect enforces access control on critical resources (e.g., firmware) independent of software state.

addresses: CWE-284

The access control policy and procedures directly mandate and enforce proper access control mechanisms across the organization.

addresses: CWE-284

Device lock enforces restricted access until re-authentication, directly reducing unauthorized use of active sessions.

addresses: CWE-284

Supervision and review of access control activities directly detects and remediates improper access configurations or usages.

addresses: CWE-284

Explicitly identifying and documenting actions permitted without identification or authentication enforces proper access control boundaries by defining justified exceptions.

addresses: CWE-284

By automatically labeling outputs with security attributes, the control supports attribute-based enforcement and reduces exploitability of improper access control weaknesses.

addresses: CWE-284

Associating and retaining security attributes with data directly supports enforcement of access control decisions across storage, processing, and transmission.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted file upload vulnerability in public-facing web application (/Superadmin_Dashboard/process/editemployee_process.php) allows unauthenticated remote attackers to upload executable malicious files (e.g., PHP web shells) to a web-accessible directory, enabling exploitation of public-facing applications and deployment/execution of web shells for RCE.

NVD Description

A vulnerability has been found in SourceCodester Human Resource Information System 1.0. Affected by this issue is some unknown functionality of the file /Superadmin_Dashboard/process/editemployee_process.php. Such manipulation of the argument employee_file201 leads to unrestricted upload. The attack may be launched remotely.…

more

The exploit has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-9476 is an unrestricted file upload vulnerability in SourceCodester Human Resource Information System 1.0, published on 2025-08-26. The flaw affects unknown functionality within the file /Superadmin_Dashboard/process/editemployee_process.php, where manipulation of the employee_file201 argument enables attackers to upload files without restrictions. It is associated with CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type).

Remote attackers can exploit this vulnerability without authentication or user interaction, as indicated by its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Exploitation requires low complexity and can lead to low-level impacts on confidentiality, integrity, and availability, potentially allowing malicious file uploads that compromise the system.

Advisories detailing the issue are available via VulDB (ctiid.321345, id.321345, submit.634757) and GitHub (lrjbsyh/CVE_Hunter issues/5 and issue-3322736605). The exploit has been publicly disclosed and may be used by attackers.

Details

CWE(s)

Affected Products

nelzkie15
human resource information system
1.0

CVEs Like This One

CVE-2025-9475Same product: Nelzkie15 Human Resource Information System
CVE-2026-7733Shared CWE-284, CWE-434
CVE-2026-2979Shared CWE-284, CWE-434
CVE-2025-7470Shared CWE-284, CWE-434
CVE-2026-3800Shared CWE-284, CWE-434
CVE-2026-4220Shared CWE-284, CWE-434
CVE-2026-4536Shared CWE-284, CWE-434
CVE-2025-15495Shared CWE-284, CWE-434
CVE-2026-3748Shared CWE-284, CWE-434
CVE-2026-1152Shared CWE-284, CWE-434

References