Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51333: n/a

0
High
VulnerabilityCVE-2023-51333cvecve-2023-51333
Published: Thu Feb 20 2025 (02/20/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

PHPJabbers Cinema Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:24:10 UTC

Technical Analysis

CVE-2023-51333 identifies a CSV Injection vulnerability in PHPJabbers Cinema Booking System version 1.0. The root cause is insufficient sanitization of user-supplied input in the Languages section Labels parameters within the System Options, which are incorporated into CSV files generated by the system. CSV Injection, also known as Formula Injection, occurs when untrusted input is embedded in CSV exports without proper escaping or validation. When such CSV files are opened in spreadsheet applications like Microsoft Excel or LibreOffice Calc, malicious formulas can execute, potentially allowing remote code execution or data exfiltration. The vulnerability requires an attacker to have at least limited privileges (PR:L) to inject malicious content into the system's CSV exports. No user interaction is needed once the malicious CSV is opened, and the attack can compromise confidentiality, integrity, and availability of the system and data. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) reflects network attack vector, low complexity, required privileges, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability poses a significant risk to organizations relying on this booking system. The CWE-1236 classification relates to improper neutralization of input in CSV files, emphasizing the need for input validation and output encoding. The lack of available patches increases urgency for mitigation.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized execution of code on systems processing cinema booking data, potentially resulting in data breaches, manipulation of booking records, or disruption of services. Confidential customer information and business-critical data could be exposed or altered, undermining trust and compliance with data protection regulations such as GDPR. The availability of booking services could be impacted by malicious payloads causing system crashes or ransomware deployment. Attackers could leverage this vulnerability to pivot within networks, escalating privileges or accessing other sensitive systems. The impact is particularly severe for organizations with high volumes of CSV data exports and those that rely on automated processing of booking information. The absence of known exploits provides a window for proactive defense, but the high CVSS score indicates that successful exploitation would have serious consequences.

Mitigation Recommendations

European organizations should immediately audit their use of PHPJabbers Cinema Booking System v1.0 and restrict access to the Languages section and System Options to trusted administrators only. Input validation must be enforced on all parameters used in CSV generation, specifically sanitizing or escaping characters that can trigger formula execution in spreadsheet software (e.g., '=', '+', '-', '@'). Where possible, disable CSV export functionality or replace it with safer formats such as JSON or XML until patches are available. Implement network segmentation and monitoring to detect anomalous CSV file generation or access patterns. Educate staff about the risks of opening CSV files from untrusted sources and encourage the use of spreadsheet software with formula execution disabled by default. Regularly review logs for suspicious activity related to CSV exports. Engage with PHPJabbers for updates or patches and apply them promptly once released. Consider deploying application-layer firewalls or input filtering proxies to block malicious payloads targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47436d939959c8022004

Added to database: 11/4/2025, 6:34:43 PM

Last enriched: 11/4/2025, 7:24:10 PM

Last updated: 11/5/2025, 2:12:56 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats