A flaw has been found in SourceCodester Pet Management System 1.0. This impacts an unknown function of the file /admin/profile.php. This manipulation of the argument website_image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-27106 A flaw has been found in SourceCodester Pet Management System 1.0. This impacts an unknown function of the file /admin/profile.php. This manipulation of the argument website_image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 09 Sep 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Mayuri K
Mayuri K pet Grooming Management Software
CPEs cpe:2.3:a:mayuri_k:pet_grooming_management_software:1.0:*:*:*:*:*:*:*
Vendors & Products Mayuri K
Mayuri K pet Grooming Management Software

Mon, 08 Sep 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 08 Sep 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester pet Management System
Vendors & Products Sourcecodester
Sourcecodester pet Management System

Mon, 08 Sep 2025 03:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in SourceCodester Pet Management System 1.0. This impacts an unknown function of the file /admin/profile.php. This manipulation of the argument website_image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title SourceCodester Pet Management System profile.php unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-09-08T16:16:38.383Z

Reserved: 2025-09-07T16:28:47.710Z

Link: CVE-2025-10081

cve-icon Vulnrichment

Updated: 2025-09-08T16:16:28.528Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-08T04:16:24.990

Modified: 2025-09-09T16:43:36.203

Link: CVE-2025-10081

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-08T15:17:28Z