A security flaw has been discovered in projectworlds can pass malicious payloads up to 1.0. This vulnerability affects unknown code of the file /add_book.php. The manipulation of the argument image results in unrestricted upload. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
References
| Link | Resource |
|---|---|
| https://github.com/GYSakura/tmp75/blob/main/report.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.333337 | Permissions Required VDB Entry |
| https://vuldb.com/?id.333337 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.698646 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-11-24 00:15
Updated : 2025-12-02 03:20
NVD link : CVE-2025-13573
Mitre link : CVE-2025-13573
CVE.ORG link : CVE-2025-13573
JSON object : View
Products Affected
projectworlds
- advanced_library_management_system
