code-projects Scholars Tracking System 1.0 allows an...
High severity
Unreviewed
Published
Feb 18, 2026
to the GitHub Advisory Database
•
Updated Feb 18, 2026
Description
Published by the National Vulnerability Database
Feb 18, 2026
Published to the GitHub Advisory Database
Feb 18, 2026
Last updated
Feb 18, 2026
code-projects Scholars Tracking System 1.0 allows an authenticated attacker to achieve remote code execution via unrestricted file upload. The endpoints update_profile_picture.php and upload_picture.php store uploaded files in a web-accessible uploads/ directory using the original, user-supplied filename without validating the file type or extension. By uploading a PHP file and then requesting it from /uploads/, an attacker can execute arbitrary PHP code as the web server user.
References