| Title | code-projects Online Lot Reservation System 1.0 File Disclosure / LFI |
|---|
| Description | An arbitrary file reading vulnerability was found in the download.php file. The vulnerability stems from the fact that the file parameter input by the user is not filtered or validated and is directly passed to the readfile() function. Attackers can read any file on the server through path traversal or absolute paths, including system configurations, sensitive data, and files of other applications. |
|---|
| Source | ⚠️ https://github.com/zzk6th/cve/issues/2 |
|---|
| User | z0ng (UID 96775) |
|---|
| Submission | 04/09/2026 13:55 (18 days ago) |
|---|
| Moderation | 04/26/2026 21:21 (17 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 359731 [code-projects Online Lot Reservation System up to 1.0 /download.php readfile File path traversal] |
|---|
| Points | 20 |
|---|