Description
Visitor Management System 1.0 by sanjay1313 is vulnerable to Unrestricted File Upload in vms/php/admin_user_insert.php and vms/php/update_1.php. The move_uploaded_file() function is called without any MIME type, extension, or content validation, allowing an authenticated admin to upload a PHP webshell and achieve Remote Code Execution on the server.
Published: 2026-04-21
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Workaround
AI Analysis

Impact

The Visitor Management System 1.0 by sanjay1313 contains an unrestricted file upload flaw within vms/php/admin_user_insert.php and vms/php/update_1.php. The move_uploaded_file() call strictly performs no MIME type, file‑extension, or content validation, enabling an authenticated administrator to upload a PHP webshell and thus gain remote code execution on the host server. This flaw is a classic example of CWE-434, where lack of file‑type validation allows execution of malicious code.

Affected Systems

All deployments of Visitor Management System 1.0 that include the vulnerable upload scripts are impacted. No vendor‑supplied patch has been released yet; therefore every instance of v1.0 cannot be updated until an official fix becomes available.

Risk and Exploitability

The vulnerability is exploitable only by users with administrative privileges, which default installations may provide. Because no EPSS score is published and the flaw is not listed in CISA KEV, quantitative exploitation risk is unmeasured, but the medium‑to‑high score of 7.2 emphasizes a high potential impact. Attackers could obtain full server control once a webshell is uploaded; the lack of validation and potential for complete remote code execution make the risk significant even if the attacker must first acquire admin credentials.

Generated by OpenCVE AI on April 22, 2026 at 06:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Add server‑side checks for MIME type, file extension, and content before calling move_uploaded_file, and explicitly reject executable script uploads.
  • Configure the web server to deny execution of any files placed in the upload directory (e.g., by using .htaccess directives or server configuration settings).
  • Ensure that the upload directory is writable only by the web process and that no unnecessary administrative accounts exist on the system.

Generated by OpenCVE AI on April 22, 2026 at 06:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sanjay1313:visitor_management_system:1.0:*:*:*:*:*:*:*

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Sanjay1313
Sanjay1313 visitor Management System
Vendors & Products Sanjay1313
Sanjay1313 visitor Management System

Wed, 22 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Title Unrestricted File Upload Lacking Validation in Visitor Management System 1.0

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Title Unrestricted File Upload Lacking Validation in Visitor Management System 1.0
Weaknesses CWE-434
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
Description Visitor Management System 1.0 by sanjay1313 is vulnerable to Unrestricted File Upload in vms/php/admin_user_insert.php and vms/php/update_1.php. The move_uploaded_file() function is called without any MIME type, extension, or content validation, allowing an authenticated admin to upload a PHP webshell and achieve Remote Code Execution on the server.
References

Subscriptions

Sanjay1313 Visitor Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-21T18:25:24.762Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37748

cve-icon Vulnrichment

Updated: 2026-04-21T18:24:59.959Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T16:16:20.113

Modified: 2026-04-22T16:02:05.980

Link: CVE-2026-37748

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:47:04Z

Weaknesses