Cyber Posture

CVE-2025-70146

CriticalPublic PoC

Published: 18 February 2026

Published
18 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0055 68.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, documentation, and review of actions permitted without authentication, preventing exposure of critical administrative functions in /admin/ endpoints.

prevent

Enforces approved authorizations for access to system resources, ensuring administrative scripts require valid sessions before allowing operations like adding or deleting records.

prevent

Monitors and controls communications at system boundaries, blocking unauthorized direct HTTP requests to unprotected /admin/ endpoints from remote attackers.

Security SummaryAI

CVE-2025-70146 is a missing authentication vulnerability affecting multiple administrative action scripts under the /admin/ directory in ProjectWorlds Online Time Table Generator 1.0. This flaw, associated with CWE-306 (Missing Authentication for Critical Function) and CWE-862 (Missing Authorization), enables remote attackers to execute unauthorized administrative operations, such as adding or deleting records, by sending direct HTTP requests to the affected endpoints without requiring a valid session. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), indicating critical severity due to its high impact on integrity and availability with no privileges required.

Any remote attacker with network access can exploit this vulnerability without authentication or user interaction, simply by crafting HTTP requests to the unprotected /admin/ endpoints. Successful exploitation allows full unauthorized control over administrative functions, potentially leading to data manipulation, deletion of critical records, or disruption of the application's timetable generation services.

References include the project page at https://projectworlds.com/online-time-table-generator-php-mysql/ and a detailed analysis at https://youngkevinn.github.io/posts/CVE-2025-70146-OTTTG-Unauth-Deletion/, which cover the vulnerability discovery and exploitation details. Security practitioners should review these for reproduction steps and apply updates if available from the vendor, while implementing network controls to block unauthenticated access to /admin/ paths as an interim mitigation.

Details

CWE(s)

Affected Products

projectworlds
online time table generator
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authentication on administrative /admin/ endpoints in a public-facing web application enables remote unauthenticated attackers to perform unauthorized admin operations (e.g., add/delete records), directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References