Description
A flaw has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. The affected element is an unknown function of the file /admin_panel/settings.php of the component Profile Picture Handler. This manipulation of the argument File causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
Published: 2026-04-03
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Remote Code Execution via unrestricted file upload
Action: Immediate Patch
AI Analysis

Impact

An unrestricted file upload flaw exists in the Profile Picture Handler of the Admin Panel. The function that handles the uploaded file argument is improperly validated, allowing an attacker to supply a malicious file. Because the upload is performed over the web and the file is stored on the server, an attacker can place executable code and subsequently trigger its execution, resulting in full remote code execution. The vulnerability is confirmed by published exploits that demonstrate this capability.

Affected Systems

ProjectsAndPrograms School Management System, versions up to and including the code commit 6b6fae5426044f89c08d0dd101c7fa71f9042a59. The product uses a rolling release model, so any released version before the commit that addresses the flaw remains vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity, but the presence of a publicly documented remote exploit and the high impact of code execution elevate practical risk. No EPSS value is available, and the vulnerability is not listed in the CISA KEV catalog, yet an attacker can reach the target via the web interface, making exploitation feasible in real‑world scenarios.

Generated by OpenCVE AI on April 3, 2026 at 18:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the version of the School Management System you are running; if it is prior to the commit that fixes the upload handler, update to the latest rolling release immediately.

Generated by OpenCVE AI on April 3, 2026 at 18:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Projectsandprograms
Projectsandprograms school Management System
Vendors & Products Projectsandprograms
Projectsandprograms school Management System

Fri, 03 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in ProjectsAndPrograms School Management System up to 6b6fae5426044f89c08d0dd101c7fa71f9042a59. The affected element is an unknown function of the file /admin_panel/settings.php of the component Profile Picture Handler. This manipulation of the argument File causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been published and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
Title ProjectsAndPrograms School Management System Profile Picture settings.php unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectsandprograms School Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-03T17:27:56.665Z

Reserved: 2026-04-03T07:39:59.695Z

Link: CVE-2026-5472

cve-icon Vulnrichment

Updated: 2026-04-03T17:27:52.951Z

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:45.740

Modified: 2026-04-03T16:16:45.740

Link: CVE-2026-5472

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:08Z

Weaknesses