A vulnerability has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. Affected by this issue is some unknown functionality of the file /assets/uploadSllyabus.php. Such manipulation of the argument File leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
History

Mon, 20 Oct 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Oranbyte
Oranbyte school Management System
CPEs cpe:2.3:a:oranbyte:school_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oranbyte
Oranbyte school Management System

Mon, 20 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Projectsandprograms
Projectsandprograms school Management System
Vendors & Products Projectsandprograms
Projectsandprograms school Management System

Tue, 14 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Oct 2025 04:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. Affected by this issue is some unknown functionality of the file /assets/uploadSllyabus.php. Such manipulation of the argument File leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
Title ProjectsAndPrograms School Management System uploadSllyabus.php unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2025-10-13T04:02:05.411Z

Updated: 2025-10-14T19:40:09.882Z

Reserved: 2025-10-12T06:37:13.689Z

Link: CVE-2025-11660

cve-icon Vulnrichment

Updated: 2025-10-14T19:38:09.127Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-13T04:15:55.707

Modified: 2025-10-20T20:21:26.480

Link: CVE-2025-11660

cve-icon Redhat

No data.