Enviar #698772: https://code-projects.org/ Blog Site In PHP With Source Code 1.0 Unauthorizedinformación

Títulohttps://code-projects.org/ Blog Site In PHP With Source Code 1.0 Unauthorized
DescripciónThe admin.php file serves as the central administration panel for the blog system, typically used for publishing, editing, and deleting posts, managing comments, and configuring system settings. The root cause of this vulnerability is the lack of proper authentication and authorization checks within the admin.php file. An attacker can directly access this file via its URL, such as http://[site]/admin.php, without the system verifying if the requesting user is logged in or possesses administrative privileges. This can lead to the following consequences: An unauthorized user can directly view the administrative dashboard. An unauthorized user can call administrative functions defined within admin.php or its included files (e.g., via crafted HTTP GET/POST requests), potentially leading to data leakage, system configuration changes, or content compromise.
Fuente⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/Unauthorized.md
Usuario
 Yohane-Mashiro (UID 92825)
Sumisión2025-11-20 17:25 (hace 5 meses)
Moderación2025-11-23 08:54 (3 days later)
EstadoAceptado
Entrada de VulDB333340 [code-projects Blog Site 1.0 /admin.php escalada de privilegios]
Puntos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!