Submit #688779: projectworlds Advanced Library Management System 1.0 SQL Injectioninfo

Titleprojectworlds Advanced Library Management System 1.0 SQL Injection
DescriptionDiscovered that the file upload operation was triggered of the 'add_librarian.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE).
Source⚠️ https://github.com/1Opera/vul/blob/main/report.md
User
 zhangmengxia (UID 92310)
Submission11/04/2025 12:08 (6 months ago)
Moderation11/16/2025 18:23 (12 days later)
StatusDuplicate
VulDB entry332588 [projectworlds Advanced Library Management System 1.0 /add_librarian.php Username sql injection]
Points0

Do you know our Splunk app?

Download it now for free!