Impact
A vulnerability in AdminAddAlbum.php allows an attacker to upload any file through the txtimage parameter without validation. The lack of file type checks and size limits means attackers can place malicious executables or scripts on the web server, possibly leading to remote code execution, unauthorized data disclosure, or denial of service. The flaw is classified under CWE‑284 and CWE‑434, indicating improper access control and unrestricted file upload weaknesses.
Affected Systems
code‑projects:Online Music Site, version 1.0. The vulnerability is present in the 1.0 release of the Online Music Site application, specifically in the Administrator/PHP/AdminAddAlbum.php component.
Risk and Exploitability
The CVSS score of 5.1 denotes a medium severity vulnerability, while the EPSS score of less than 1% indicates a low current probability of exploitation. The flaw can be triggered from any remote client by submitting a crafted request to the txtimage argument. There are no known authentication prerequisites; the upload endpoint is accessible to administrators, but the lack of proper checks makes exploitation straightforward. This vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment