| Title | projectworlds Advanced Library Management System 1.0 SQL Injection |
|---|
| Description | Discovered that the file upload operation was triggered of the 'add_librarian.php' file and the uploaded file was received using the '$_FILES' variable. Due to the lack of appropriate input validation and cleaning, remote attackers can pass malicious payloads through this file upload feature, resulting in unrestricted file uploads, which may further lead to remote code execution (RCE). |
|---|
| Source | ⚠️ https://github.com/1Opera/vul/blob/main/report.md |
|---|
| User | zhangmengxia (UID 92310) |
|---|
| Submission | 11/04/2025 12:08 (6 months ago) |
|---|
| Moderation | 11/16/2025 18:23 (12 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 332588 [projectworlds Advanced Library Management System 1.0 /add_librarian.php Username sql injection] |
|---|
| Points | 0 |
|---|