CVE-2022-30529: n/a in n/a
File upload vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to upload arbitrary files via /system/application/libs/js/tinymce/plugins/filemanager/dialog.php and /system/application/libs/js/tinymce/plugins/filemanager/upload.php.
AI Analysis
Technical Summary
CVE-2022-30529 is a file upload vulnerability identified in the asith-eranga ISIC tour booking system, specifically in versions published up to February 13, 2018. The vulnerability exists in the file upload functionality exposed via the TinyMCE file manager plugin endpoints: /system/application/libs/js/tinymce/plugins/filemanager/dialog.php and /system/application/libs/js/tinymce/plugins/filemanager/upload.php. This flaw allows an attacker with high privileges (PR:H) to upload arbitrary files to the server without requiring user interaction (UI:N). The vulnerability is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. Exploiting this vulnerability can lead to full compromise of the affected system, as arbitrary files uploaded could include web shells or malicious scripts that impact confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.2 (high severity), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, but requiring high privileges, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability affects a niche product used for tour booking, which may be deployed in specific organizations or regions. Given the nature of the vulnerability, attackers with elevated access could leverage it to escalate privileges or maintain persistence by uploading malicious payloads to the web server environment.
Potential Impact
For European organizations using the asith-eranga ISIC tour booking system, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, data theft, defacement, or service disruption. Confidential customer data, including personal and payment information, could be exposed or manipulated, leading to regulatory non-compliance under GDPR. The integrity of booking data and availability of the service could be compromised, impacting business operations and customer trust. Since the vulnerability requires high privileges, it implies that an attacker must first gain elevated access, possibly through other vulnerabilities or insider threats, making it a critical post-compromise vector. Organizations in the tourism sector, travel agencies, or related service providers in Europe that rely on this system are at risk of targeted attacks aiming to disrupt services or exfiltrate sensitive data. The absence of patches increases the window of exposure, and the lack of known exploits does not preclude future exploitation, especially if threat actors develop weaponized payloads.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the vulnerable endpoints (/dialog.php and /upload.php) via network-level controls such as IP whitelisting or web application firewalls (WAF) with custom rules to block unauthorized file upload attempts. 2. Conduct a thorough privilege audit to ensure that only trusted users have high-level access to the system, minimizing the risk of privilege abuse. 3. Implement strict file upload validation and sanitization controls, including limiting allowed file types, enforcing file size limits, and scanning uploaded files with antivirus or malware detection solutions. 4. If possible, isolate the affected application in a segmented network zone to limit lateral movement in case of compromise. 5. Monitor logs for suspicious upload activities or anomalous file creations in the application directories. 6. Develop an incident response plan specific to this vulnerability, including steps for containment and recovery. 7. Engage with the software provider or community to seek patches or updates; if unavailable, consider migrating to alternative, actively maintained booking systems. 8. Regularly back up critical data and verify backup integrity to enable recovery from potential ransomware or destructive attacks leveraging this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Austria
CVE-2022-30529: n/a in n/a
Description
File upload vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to upload arbitrary files via /system/application/libs/js/tinymce/plugins/filemanager/dialog.php and /system/application/libs/js/tinymce/plugins/filemanager/upload.php.
AI-Powered Analysis
Technical Analysis
CVE-2022-30529 is a file upload vulnerability identified in the asith-eranga ISIC tour booking system, specifically in versions published up to February 13, 2018. The vulnerability exists in the file upload functionality exposed via the TinyMCE file manager plugin endpoints: /system/application/libs/js/tinymce/plugins/filemanager/dialog.php and /system/application/libs/js/tinymce/plugins/filemanager/upload.php. This flaw allows an attacker with high privileges (PR:H) to upload arbitrary files to the server without requiring user interaction (UI:N). The vulnerability is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. Exploiting this vulnerability can lead to full compromise of the affected system, as arbitrary files uploaded could include web shells or malicious scripts that impact confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.2 (high severity), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, but requiring high privileges, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability affects a niche product used for tour booking, which may be deployed in specific organizations or regions. Given the nature of the vulnerability, attackers with elevated access could leverage it to escalate privileges or maintain persistence by uploading malicious payloads to the web server environment.
Potential Impact
For European organizations using the asith-eranga ISIC tour booking system, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, data theft, defacement, or service disruption. Confidential customer data, including personal and payment information, could be exposed or manipulated, leading to regulatory non-compliance under GDPR. The integrity of booking data and availability of the service could be compromised, impacting business operations and customer trust. Since the vulnerability requires high privileges, it implies that an attacker must first gain elevated access, possibly through other vulnerabilities or insider threats, making it a critical post-compromise vector. Organizations in the tourism sector, travel agencies, or related service providers in Europe that rely on this system are at risk of targeted attacks aiming to disrupt services or exfiltrate sensitive data. The absence of patches increases the window of exposure, and the lack of known exploits does not preclude future exploitation, especially if threat actors develop weaponized payloads.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the vulnerable endpoints (/dialog.php and /upload.php) via network-level controls such as IP whitelisting or web application firewalls (WAF) with custom rules to block unauthorized file upload attempts. 2. Conduct a thorough privilege audit to ensure that only trusted users have high-level access to the system, minimizing the risk of privilege abuse. 3. Implement strict file upload validation and sanitization controls, including limiting allowed file types, enforcing file size limits, and scanning uploaded files with antivirus or malware detection solutions. 4. If possible, isolate the affected application in a segmented network zone to limit lateral movement in case of compromise. 5. Monitor logs for suspicious upload activities or anomalous file creations in the application directories. 6. Develop an incident response plan specific to this vulnerability, including steps for containment and recovery. 7. Engage with the software provider or community to seek patches or updates; if unavailable, consider migrating to alternative, actively maintained booking systems. 8. Regularly back up critical data and verify backup integrity to enable recovery from potential ransomware or destructive attacks leveraging this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-05-10T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef46a
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/22/2025, 7:35:58 AM
Last updated: 2/7/2026, 10:06:59 AM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.