PHPGurukul Pre-School Enrollment System, Directory Traversal, CVE-2025-50349 (Critical)

Listen to this Post

How CVE-2025-50349 Works

The vulnerability exists in `update-teacher-pic.php` due to insufficient input validation. Attackers can manipulate file paths using `../` sequences to traverse directories and upload malicious files outside the intended directory. This allows arbitrary file write/overwrite, potentially leading to remote code execution (RCE) by uploading a webshell. The system fails to sanitize user-supplied filenames, enabling attackers to bypass restricted upload locations.

DailyCVE Form

Platform: PHPGurukul Pre-School Enrollment
Version: 1.0
Vulnerability: Directory Traversal
Severity: Critical
Date: 06/25/2025

Prediction: Patch by 07/15/2025

What Undercode Say

curl -X POST -F "[email protected];filename=../../malicious.php" http://target/update-teacher-pic.php
// Vulnerable code snippet (update-teacher-pic.php)
$target_dir = "uploads/";
$target_file = $target_dir . basename($_FILES["file"]["name"]);
move_uploaded_file($_FILES["file"]["tmp_name"], $target_file);

How Exploit

1. Craft a malicious PHP file.

2. Bypass upload restrictions using `../` sequences.

3. Overwrite system files or deploy webshells.

Protection from this CVE

  • Input sanitization
  • Path normalization
  • File extension whitelisting

Impact

  • Remote Code Execution
  • Data manipulation
  • System compromise

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top