CVE-2025-15404

MEDIUM5.3/ 10.0
Share:
Published: January 1, 2026 at 02:16 PM
Modified: January 6, 2026 at 07:19 PM
Source: cna@vuldb.com

Vulnerability Description

A security vulnerability has been detected in campcodes School File Management System 1.0. The affected element is an unknown function of the file /save_file.php. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

CVSS Metrics

Base Score
5.3
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Campcodes School File Management System 1.0 is vulnerable to a critical security flaw allowing for unrestricted file uploads via the /save_file.php endpoint. This vulnerability enables remote attackers to upload malicious files, potentially leading to remote code execution (RCE) and complete system compromise. Immediate patching and mitigation are crucial to prevent exploitation.

02 // Vulnerability Mechanism

Step 1: Reconnaissance: The attacker identifies the target system running Campcodes School File Management System 1.0 and identifies the /save_file.php endpoint.

Step 2: Payload Creation: The attacker crafts a malicious file, such as a PHP web shell or a script designed to exploit other vulnerabilities on the server.

Step 3: Payload Delivery: The attacker uses a tool like curl or a custom script to send an HTTP POST request to /save_file.php, including the malicious file as the File argument.

Step 4: File Upload: The vulnerable script processes the request and uploads the attacker's file to a publicly accessible directory on the server, without proper validation.

Step 5: Post-Exploitation: The attacker accesses the uploaded file (e.g., the web shell) through a web browser or other means, triggering the execution of the malicious code and gaining control of the server.

03 // Deep Technical Analysis

The vulnerability stems from a lack of proper input validation and sanitization within the /save_file.php script when handling the File argument. The script likely fails to check the file type, size, or content, allowing attackers to upload arbitrary files, including web shells, executable scripts, or other malicious payloads. The root cause is a missing or inadequate implementation of security controls such as file extension whitelisting, file size limits, and content type validation. This allows attackers to bypass security measures and upload malicious files to the server.

CVE-2025-15404 - MEDIUM Severity (5.3) | Free CVE Database | 4nuxd