CVE-2024-12950: SQL Injection in code-projects Travel Management System
A vulnerability was found in code-projects/projectworlds Travel Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /subcat.php. The manipulation of the argument catid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2024-12950 is a SQL Injection vulnerability identified in version 1.0 of the Travel Management System developed by code-projects/projectworlds. The vulnerability exists in the /subcat.php file, specifically in the processing of the 'catid' parameter. An attacker can manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability is remotely exploitable without requiring user interaction or authentication, which increases its risk profile. However, the CVSS 4.0 score is 5.3 (medium severity), reflecting that the attack complexity is low but privileges required are low (PR:L), and the impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L). No known exploits are currently in the wild, and no patches have been published yet. The vulnerability could allow attackers to read or modify data in the database, potentially leading to data leakage, data corruption, or unauthorized actions within the application. Given the nature of travel management systems, which often handle sensitive customer and booking information, exploitation could compromise personal data and business operations.
Potential Impact
For European organizations using the affected Travel Management System 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. The potential impact includes exposure of personal identifiable information (PII) of customers, disruption of booking and travel management services, and reputational damage. Since the vulnerability allows remote exploitation without authentication, attackers could target these systems from anywhere, increasing the risk of widespread attacks. The medium severity rating suggests that while the impact is not catastrophic, it is significant enough to warrant immediate attention, especially for organizations handling sensitive travel data under GDPR regulations. Data breaches could lead to regulatory penalties and loss of customer trust. Additionally, compromised systems could be used as pivot points for further attacks within the organization's network.
Mitigation Recommendations
Organizations should immediately audit their use of the Travel Management System version 1.0 and identify any instances of the vulnerable /subcat.php component. Since no official patches are currently available, temporary mitigations include implementing web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'catid' parameter. Input validation and parameterized queries should be enforced in the application code to prevent injection. If possible, upgrade to a newer, patched version of the software once available. Conduct thorough security testing and code reviews focusing on input handling in the affected module. Monitor logs for suspicious activity related to SQL injection attempts. Additionally, restrict database user permissions to the minimum necessary to limit the potential damage of an injection attack. Organizations should also prepare incident response plans to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2024-12950: SQL Injection in code-projects Travel Management System
Description
A vulnerability was found in code-projects/projectworlds Travel Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /subcat.php. The manipulation of the argument catid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2024-12950 is a SQL Injection vulnerability identified in version 1.0 of the Travel Management System developed by code-projects/projectworlds. The vulnerability exists in the /subcat.php file, specifically in the processing of the 'catid' parameter. An attacker can manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to the backend database. The vulnerability is remotely exploitable without requiring user interaction or authentication, which increases its risk profile. However, the CVSS 4.0 score is 5.3 (medium severity), reflecting that the attack complexity is low but privileges required are low (PR:L), and the impact on confidentiality, integrity, and availability is limited (VC:L, VI:L, VA:L). No known exploits are currently in the wild, and no patches have been published yet. The vulnerability could allow attackers to read or modify data in the database, potentially leading to data leakage, data corruption, or unauthorized actions within the application. Given the nature of travel management systems, which often handle sensitive customer and booking information, exploitation could compromise personal data and business operations.
Potential Impact
For European organizations using the affected Travel Management System 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. The potential impact includes exposure of personal identifiable information (PII) of customers, disruption of booking and travel management services, and reputational damage. Since the vulnerability allows remote exploitation without authentication, attackers could target these systems from anywhere, increasing the risk of widespread attacks. The medium severity rating suggests that while the impact is not catastrophic, it is significant enough to warrant immediate attention, especially for organizations handling sensitive travel data under GDPR regulations. Data breaches could lead to regulatory penalties and loss of customer trust. Additionally, compromised systems could be used as pivot points for further attacks within the organization's network.
Mitigation Recommendations
Organizations should immediately audit their use of the Travel Management System version 1.0 and identify any instances of the vulnerable /subcat.php component. Since no official patches are currently available, temporary mitigations include implementing web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'catid' parameter. Input validation and parameterized queries should be enforced in the application code to prevent injection. If possible, upgrade to a newer, patched version of the software once available. Conduct thorough security testing and code reviews focusing on input handling in the affected module. Monitor logs for suspicious activity related to SQL injection attempts. Additionally, restrict database user permissions to the minimum necessary to limit the potential damage of an injection attack. Organizations should also prepare incident response plans to quickly address any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-12-25T18:10:58.541Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb886
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 3:12:05 PM
Last updated: 7/27/2025, 1:16:58 AM
Views: 11
Related Threats
CVE-2025-8885: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.