Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-53753: Cross-Site Request Forgery (CSRF) in CultBooking CultBooking Hotel Booking Engine

0
Unknown
VulnerabilityCVE-2024-53753cvecve-2024-53753
Published: Mon Dec 02 2024 (12/02/2024, 13:48:36 UTC)
Source: CVE Database V5
Vendor/Project: CultBooking
Product: CultBooking Hotel Booking Engine

Description

Cross-Site Request Forgery (CSRF) vulnerability in CultBooking CultBooking Hotel Booking Engine cultbooking-booking-engine allows Stored XSS.This issue affects CultBooking Hotel Booking Engine: from n/a through <= 2.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 07:40:34 UTC

Technical Analysis

CVE-2024-53753 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the CultBooking Hotel Booking Engine, a software product used to manage hotel bookings online. The affected versions include all releases up to and including version 2.1. The vulnerability allows an attacker to trick an authenticated user into submitting unauthorized requests to the booking engine, leveraging the user's credentials and session context. This CSRF flaw is compounded by the presence of Stored Cross-Site Scripting (XSS), meaning that malicious scripts can be permanently injected into the application’s data store and executed in the context of users’ browsers. Such a combination can enable attackers to hijack user sessions, steal sensitive information, manipulate booking data, or perform administrative actions without consent. The vulnerability does not require user interaction beyond visiting a malicious page and does not require authentication for the initial attack vector, but successful exploitation depends on the victim being logged into the vulnerable system. No CVSS score has been assigned yet, and no public exploits have been reported. The vulnerability was published on December 2, 2024, and was reserved on November 22, 2024, by Patchstack. The lack of official patches or mitigation guidance from the vendor increases the risk for organizations relying on this software. The technical details suggest that the core issue stems from inadequate request validation and insufficient anti-CSRF protections, alongside poor input sanitization leading to stored XSS. This vulnerability is critical for web applications handling sensitive booking and personal data, especially in hospitality sectors.

Potential Impact

The impact of CVE-2024-53753 on organizations worldwide can be significant, particularly for those in the hospitality and travel industries that use the CultBooking Hotel Booking Engine. Exploitation could lead to unauthorized changes in booking data, financial fraud, and leakage of personal customer information, undermining customer trust and potentially violating data protection regulations such as GDPR. The stored XSS component can facilitate persistent attacks, allowing attackers to execute malicious scripts in users’ browsers repeatedly, which can lead to session hijacking, credential theft, and further compromise of internal systems. Additionally, attackers could leverage this vulnerability to conduct phishing campaigns or spread malware through the compromised booking platform. The absence of known public exploits currently limits immediate widespread impact, but the vulnerability's presence in a critical customer-facing system makes it a high-value target for attackers. Organizations may face reputational damage, legal liabilities, and operational disruptions if exploited. The scope is limited to users of the CultBooking Hotel Booking Engine, but given the global nature of the hospitality industry, the potential reach is broad.

Mitigation Recommendations

To mitigate CVE-2024-53753, organizations should implement several specific measures beyond generic advice: 1) Immediately audit the CultBooking Hotel Booking Engine installations to identify affected versions and isolate vulnerable instances. 2) Implement robust anti-CSRF tokens on all state-changing requests to ensure that requests originate from legitimate users and sessions. 3) Apply strict input validation and output encoding to prevent stored XSS, sanitizing all user-supplied data before storage and display. 4) Monitor web application logs for unusual or unauthorized requests indicative of CSRF or XSS exploitation attempts. 5) Restrict user privileges within the booking engine to the minimum necessary to reduce the impact of potential exploitation. 6) If possible, deploy Web Application Firewalls (WAFs) with custom rules to detect and block CSRF and XSS attack patterns. 7) Engage with the vendor or community to obtain patches or updates as they become available and apply them promptly. 8) Educate users and administrators about the risks of CSRF and XSS to reduce the likelihood of successful social engineering or phishing attacks. 9) Consider isolating the booking engine environment or using additional authentication layers such as multi-factor authentication to limit unauthorized access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-11-22T13:52:06.041Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7560e6bfc5ba1df05521

Added to database: 4/1/2026, 7:43:28 PM

Last enriched: 4/2/2026, 7:40:34 AM

Last updated: 4/6/2026, 9:33:19 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses