Impact
The Exploit in the Certificate Generation System allows attackers to upload arbitrary files through the /restructured/csv.php endpoint without any validation. This lack of type or permission checks can lead to execution of malicious scripts on the server, effectively granting remote code execution. The flaw is identified by CWE‑284 for missing authorization and CWE‑434 for unrestricted file upload.
Affected Systems
This vulnerability affects all releases of Great Developers Certificate Generation System up to the commit 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73. Because the project uses a rolling release model and the repository has been inactive, specific downstream versions that may still be in use are not documented. Operators should assume any version that includes the /restructured/csv.php functionality without recent fixes is potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity, while the EPSS score of less than 1% points to a low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalogue. Attackers can exploit the flaw remotely by accessing the certificate upload page, uploading a crafted file, and triggering its execution. Mitigation is straightforward when the server is properly configured; without it, the vulnerability could be a stepping stone into the host system.
OpenCVE Enrichment