Disclosure for CVE-2025-50716 to CVE-2025-50721
This repository discloses multiple vulnerabilities discovered in RealEstate-PHP v1.0, a PHP-based property listing management system developed by CodeAstro.
- Product: RealEstate-PHP
- Version: v1.0
- Vendor: CodeAstro
- URL: https://codeastro.com
CVE ID | Type | Component | Impact |
---|---|---|---|
CVE-2025-50716 | Stored XSS | userlist.php | Admin session hijack |
CVE-2025-50717 | SQL Injection | admin/index.php | Admin login bypass |
CVE-2025-50718 | SQL Injection | login.php | User login bypass |
CVE-2025-50719 | Reflected XSS (POST) | calc.php | Arbitrary script execution |
CVE-2025-50720 | SQL Injection | propertydetail.php?pid | Data exposure |
CVE-2025-50721 | Remote Code Execution | register.php | Arbitrary PHP execution |
- Affected Component:
userlist.php
- Attack Vector: Register with a name/email like
<script>alert(1)</script>
- Trigger: Admin views the user list
- Impact: Arbitrary JavaScript execution in admin browser
- PoC:
- Register with
Name: <script>alert(document.domain)</script>
- Admin logs into
/admin/userlist.php
- Payload executes
- Register with
- Affected Component:
admin/index.php
- Injection Point:
auser
field - Payload:
' OR 1=1 LIMIT 1 -- -
- Impact: Admin authentication bypass
- Affected Component:
login.php
- Injection Point:
email
field - Payload:
Email: test@example.com' OR 1=1 -- - Password: any
- Impact: Unauthorized user access
- Affected Component:
calc.php
- Attack Vector: POST request with JavaScript payload in any field
- PoC:
<form action="http://target-site/RealEstate-PHP/calc.php" method="POST"> <input name="amount" value='"><script>alert(1)</script>' /> <input name="month" value="12" /> <input name="interest" value="2" /> <input type="submit" /> </form>
- Impact: Script execution in user's browser
- Affected Component:
propertydetail.php
- Payload:
http://target/RealEstate-PHP/propertydetail.php?pid=1' OR 1=1 -- -
- Impact: Dump all property records
- Affected Component:
register.php
- Issue: Uploads
.php
disguised as.png
- Technique:
- Intercept file upload request using Burp Suite
- Change filename in Content-Disposition to
shell.php
- Result:
- File is saved to
/admin/user/shell.php
- Accessing it allows remote OS command execution
- File is saved to
- Reference: Exploit-DB #51840
Date | Event |
---|---|
2024-05-02 | Attempted to contact vendor (support@codeastro.com) β no response |
2025-07-17 | CVE-2025-50716β50721 assigned by MITRE |
2025-07-17 | This public advisory published |
Name: MooseLove
Role: Independent security researcher / bug hunter
Contact: Available upon request
PGP: Provided to MITRE during CVE request
- Product: https://codeastro.com/real-estate-management-system-in-php-with-source-code/
- Exploit: https://www.exploit-db.com/exploits/51840 (for CVE-2025-50721)
This advisory is provided for public security awareness. Free to share with attribution.