| Title | https://code-projects.org/ Blog Site In PHP With Source Code 1.0 Unauthorized |
|---|
| Description | The admin.php file serves as the central administration panel for the blog system, typically used for publishing, editing, and deleting posts, managing comments, and configuring system settings.
The root cause of this vulnerability is the lack of proper authentication and authorization checks within the admin.php file. An attacker can directly access this file via its URL, such as http://[site]/admin.php, without the system verifying if the requesting user is logged in or possesses administrative privileges.
This can lead to the following consequences:
An unauthorized user can directly view the administrative dashboard.
An unauthorized user can call administrative functions defined within admin.php or its included files (e.g., via crafted HTTP GET/POST requests), potentially leading to data leakage, system configuration changes, or content compromise. |
|---|
| Source | ⚠️ https://github.com/Yohane-Mashiro/cve/blob/main/Unauthorized.md |
|---|
| User | Yohane-Mashiro (UID 92825) |
|---|
| Submission | 11/20/2025 17:25 (5 months ago) |
|---|
| Moderation | 11/23/2025 08:54 (3 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 333340 [code-projects Blog Site 1.0 /admin.php improper authorization] |
|---|
| Points | 20 |
|---|