CVE-2025-70146
Published: 18 February 2026
Description
Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, documentation, and review of actions permitted without authentication, preventing exposure of critical administrative functions in /admin/ endpoints.
Enforces approved authorizations for access to system resources, ensuring administrative scripts require valid sessions before allowing operations like adding or deleting records.
Monitors and controls communications at system boundaries, blocking unauthorized direct HTTP requests to unprotected /admin/ endpoints from remote attackers.
Security SummaryAI
CVE-2025-70146 is a missing authentication vulnerability affecting multiple administrative action scripts under the /admin/ directory in ProjectWorlds Online Time Table Generator 1.0. This flaw, associated with CWE-306 (Missing Authentication for Critical Function) and CWE-862 (Missing Authorization), enables remote attackers to execute unauthorized administrative operations, such as adding or deleting records, by sending direct HTTP requests to the affected endpoints without requiring a valid session. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), indicating critical severity due to its high impact on integrity and availability with no privileges required.
Any remote attacker with network access can exploit this vulnerability without authentication or user interaction, simply by crafting HTTP requests to the unprotected /admin/ endpoints. Successful exploitation allows full unauthorized control over administrative functions, potentially leading to data manipulation, deletion of critical records, or disruption of the application's timetable generation services.
References include the project page at https://projectworlds.com/online-time-table-generator-php-mysql/ and a detailed analysis at https://youngkevinn.github.io/posts/CVE-2025-70146-OTTTG-Unauth-Deletion/, which cover the vulnerability discovery and exploitation details. Security practitioners should review these for reproduction steps and apply updates if available from the vendor, while implementing network controls to block unauthenticated access to /admin/ paths as an interim mitigation.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authentication on administrative /admin/ endpoints in a public-facing web application enables remote unauthenticated attackers to perform unauthorized admin operations (e.g., add/delete records), directly facilitating T1190: Exploit Public-Facing Application.