Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51299: n/a

0
Medium
VulnerabilityCVE-2023-51299cvecve-2023-51299
Published: Wed Feb 19 2025 (02/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

PHPJabbers Hotel Booking System v4.0 is vulnerable to HTML Injection in the "name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title" parameters.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:16:11 UTC

Technical Analysis

CVE-2023-51299 identifies an HTML Injection vulnerability in PHPJabbers Hotel Booking System version 4.0. The vulnerability affects multiple input parameters such as name, plugin_sms_api_key, plugin_sms_country_code, and title. HTML Injection, classified under CWE-79, allows attackers to inject arbitrary HTML code into web pages viewed by other users. This can lead to various attacks including cross-site scripting (XSS) variants, phishing, or UI redressing. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), but does require user interaction (UI:R), such as clicking a malicious link or visiting a crafted page. The scope is changed (S:C), indicating that exploitation can affect resources beyond the vulnerable component. The impact affects confidentiality and integrity partially (C:L/I:L) but does not affect availability (A:N). No patches or known exploits are currently available, but the vulnerability is publicly disclosed as of February 19, 2025. The lack of a patch increases the urgency for organizations to implement mitigations. The vulnerability is significant for web applications handling sensitive booking and customer data, as injected HTML could be used to steal session tokens, redirect users, or manipulate displayed content.

Potential Impact

For European organizations, particularly those in the hospitality and travel sectors using PHPJabbers Hotel Booking System, this vulnerability poses a risk to customer data confidentiality and the integrity of booking information. Attackers could exploit the HTML Injection to conduct phishing attacks, steal session cookies, or manipulate booking details, potentially leading to financial fraud or reputational damage. Given the widespread use of online booking systems in Europe’s tourism-dependent economies, exploitation could disrupt business operations and erode customer trust. The vulnerability does not directly impact system availability but could facilitate further attacks that compromise broader system security. Organizations processing personal data under GDPR must consider the compliance implications of data breaches resulting from this vulnerability.

Mitigation Recommendations

Organizations should immediately review and sanitize all user inputs for the affected parameters (name, plugin_sms_api_key, plugin_sms_country_code, title) to ensure that HTML or script code cannot be injected. Implement strict output encoding on all user-supplied data before rendering it in the browser to prevent execution of injected HTML. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor web application logs for unusual input patterns or repeated injection attempts. If possible, isolate the booking system from other critical infrastructure to limit potential lateral movement. Engage with PHPJabbers for official patches or updates and apply them promptly once available. Conduct regular security assessments and penetration testing focused on injection vulnerabilities. Educate staff and users about phishing risks associated with malicious links that could exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a473e6d939959c8021f5f

Added to database: 11/4/2025, 6:34:38 PM

Last enriched: 11/4/2025, 7:16:11 PM

Last updated: 11/5/2025, 3:44:59 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats