CVE-2024-0883: CWE-89 SQL Injection in SourceCodester Online Tours & Travels Management System
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been declared as critical. This vulnerability affects the function prepare of the file admin/pay.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252034 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-0883 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Tours & Travels Management System. The vulnerability exists in the 'prepare' function within the admin/pay.php file, where the 'id' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw enables remote attackers to manipulate backend database queries by crafting specially designed input for the 'id' argument. Exploitation does not require user interaction but does require some level of privileges (PR:L - privileges required: low), indicating that an attacker must have limited access to the system to trigger the vulnerability. The CVSS v3.1 base score is 6.3, categorized as medium severity, reflecting the potential for limited confidentiality, integrity, and availability impacts. Specifically, the vulnerability can lead to unauthorized data disclosure, data modification, or disruption of service within the affected application. Although no public exploits are currently known to be actively used in the wild, the vulnerability details have been publicly disclosed, increasing the risk of exploitation attempts. The absence of an official patch or mitigation from the vendor at this time further elevates the risk for organizations using this software. The vulnerability is typical of CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical class of injection flaws that can severely compromise database security if left unaddressed.
Potential Impact
For European organizations using the SourceCodester Online Tours & Travels Management System, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their customer and operational data. Given the nature of the application—managing tours and travel bookings—compromise could lead to unauthorized access to sensitive personal information, payment details, and booking records. This could result in data breaches subject to GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could alter booking information or disrupt payment processing, impacting business operations and customer trust. The medium severity rating suggests that while the vulnerability requires some privileges, the potential damage is non-trivial. European travel agencies or tour operators relying on this system may face targeted attacks aiming to exploit this flaw, especially as the travel sector is a frequent target for cybercriminals seeking financial gain or disruption. The public disclosure of the vulnerability increases the likelihood of exploitation attempts, making timely mitigation critical to prevent data breaches and service interruptions.
Mitigation Recommendations
To mitigate this vulnerability effectively, organizations should first implement strict input validation and parameterized queries (prepared statements) in the 'admin/pay.php' file, specifically sanitizing the 'id' parameter to prevent SQL injection. Since no official patch is currently available, administrators should consider applying manual code reviews and fixes to ensure all database interactions use secure coding practices. Additionally, restricting access to the admin interface through network segmentation, VPNs, or IP whitelisting can reduce the attack surface. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'id' parameter can provide an additional protective layer. Regularly monitoring logs for suspicious database query patterns and unusual admin activity will help in early detection of exploitation attempts. Organizations should also plan to upgrade to a patched version once available or consider alternative software solutions with better security track records. Finally, conducting security awareness training for administrators about the risks of SQL injection and the importance of secure coding practices is recommended.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2024-0883: CWE-89 SQL Injection in SourceCodester Online Tours & Travels Management System
Description
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been declared as critical. This vulnerability affects the function prepare of the file admin/pay.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-252034 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-0883 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Tours & Travels Management System. The vulnerability exists in the 'prepare' function within the admin/pay.php file, where the 'id' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This flaw enables remote attackers to manipulate backend database queries by crafting specially designed input for the 'id' argument. Exploitation does not require user interaction but does require some level of privileges (PR:L - privileges required: low), indicating that an attacker must have limited access to the system to trigger the vulnerability. The CVSS v3.1 base score is 6.3, categorized as medium severity, reflecting the potential for limited confidentiality, integrity, and availability impacts. Specifically, the vulnerability can lead to unauthorized data disclosure, data modification, or disruption of service within the affected application. Although no public exploits are currently known to be actively used in the wild, the vulnerability details have been publicly disclosed, increasing the risk of exploitation attempts. The absence of an official patch or mitigation from the vendor at this time further elevates the risk for organizations using this software. The vulnerability is typical of CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), a common and critical class of injection flaws that can severely compromise database security if left unaddressed.
Potential Impact
For European organizations using the SourceCodester Online Tours & Travels Management System, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their customer and operational data. Given the nature of the application—managing tours and travel bookings—compromise could lead to unauthorized access to sensitive personal information, payment details, and booking records. This could result in data breaches subject to GDPR regulations, leading to legal penalties and reputational damage. Additionally, attackers could alter booking information or disrupt payment processing, impacting business operations and customer trust. The medium severity rating suggests that while the vulnerability requires some privileges, the potential damage is non-trivial. European travel agencies or tour operators relying on this system may face targeted attacks aiming to exploit this flaw, especially as the travel sector is a frequent target for cybercriminals seeking financial gain or disruption. The public disclosure of the vulnerability increases the likelihood of exploitation attempts, making timely mitigation critical to prevent data breaches and service interruptions.
Mitigation Recommendations
To mitigate this vulnerability effectively, organizations should first implement strict input validation and parameterized queries (prepared statements) in the 'admin/pay.php' file, specifically sanitizing the 'id' parameter to prevent SQL injection. Since no official patch is currently available, administrators should consider applying manual code reviews and fixes to ensure all database interactions use secure coding practices. Additionally, restricting access to the admin interface through network segmentation, VPNs, or IP whitelisting can reduce the attack surface. Employing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'id' parameter can provide an additional protective layer. Regularly monitoring logs for suspicious database query patterns and unusual admin activity will help in early detection of exploitation attempts. Organizations should also plan to upgrade to a patched version once available or consider alternative software solutions with better security track records. Finally, conducting security awareness training for administrators about the risks of SQL injection and the importance of secure coding practices is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-25T13:31:28.388Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68387d4f182aa0cae28316cd
Added to database: 5/29/2025, 3:29:19 PM
Last enriched: 7/7/2025, 11:41:05 PM
Last updated: 12/3/2025, 2:16:55 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13756: CWE-862 Missing Authorization in techjewel Fluent Booking – The Ultimate Appointments Scheduling, Events Booking, Events Calendar Solution
MediumCVE-2025-13401: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in optimizingmatters Autoptimize
MediumCVE-2025-13390: CWE-303 Incorrect Implementation of Authentication Algorithm in listingthemes WP Directory Kit
CriticalCVE-2025-13359: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumCVE-2025-13354: CWE-862 Missing Authorization in stevejburge Tag, Category, and Taxonomy Manager – AI Autotagger with OpenAI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.