Description
A vulnerability was found in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This issue affects the function move_uploaded_file of the file /AssignmentSection/submission/upload.php. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Patch ASAP
AI Analysis

Impact

The vulnerability originates from an unvalidated use of the PHP function move_uploaded_file within upload.php. An attacker can supply malicious file content via the File argument, bypassing any checks on MIME type, extension, or size. This flaw falls under CWE‑284 (Improper Control of Access Permissions) and CWE‑434 (Unrestricted Upload of File with Dangerous Type). If an attacker uploads a file that the web server can execute—such as a PHP script—this could lead to arbitrary code execution, data tampering, or denial of service of the application.

Affected Systems

The affected product is Cyber‑III Student‑Management‑System. No specific version information is available from the CVE; the issue was reported against the code base as of the identifier 1a938fa61e9f735078e9b291d2e6215b4942af3f, but no repaired release has been published. Therefore, all deployments of the system that have not been manually patched or upgraded are potentially vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk, and the vulnerability is not listed in the CISA KEV catalog. It is explicitly stated that the attack can be initiated remotely through the web interface, implying that remote attackers can exploit the flaw by crafting a request to upload a file. The lack of file validation and the write permission of the upload directory give an attacker the ability to place arbitrary files on the server. If the upload directory is web‑exposed or executable, the attacker could execute code, thereby compromising confidentiality, integrity, and availability of the application. The EPSS score is not available, but the publicly released exploit suggests a realistic likelihood of exploitation.

Generated by OpenCVE AI on April 6, 2026 at 22:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor patch as soon as it is released by Cyber‑III
  • Restrict the upload functionality to authenticated and authorized users only
  • Validate the MIME type, file extension, and file size before calling move_uploaded_file
  • Configure the upload directory with restrictive permissions so that uploaded files cannot be executed
  • Continuously monitor upload logs and file system for unauthorized or suspicious file uploads
  • Review the project's issue tracker regularly for updates or potential temporary fixes

Generated by OpenCVE AI on April 6, 2026 at 22:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Cyber-iii
Cyber-iii student-management-system
Vendors & Products Cyber-iii
Cyber-iii student-management-system

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Cyber-III Student-Management-System up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This issue affects the function move_uploaded_file of the file /AssignmentSection/submission/upload.php. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
Title Cyber-III Student-Management-System upload.php move_uploaded_file unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Cyber-iii Student-management-system
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T14:23:09.397Z

Reserved: 2026-04-06T08:14:09.694Z

Link: CVE-2026-5670

cve-icon Vulnrichment

Updated: 2026-04-07T14:23:04.738Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T17:17:15.470

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5670

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:39:16Z

Weaknesses