CVE-2025-11103: Unrestricted Upload in Projectworlds Online Tours and Travels
A security vulnerability has been detected in Projectworlds Online Tours and Travels 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/change-image.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-11103 is a medium-severity security vulnerability identified in version 1.0 of Projectworlds' Online Tours and Travels application. The vulnerability exists in the /admin/change-image.php file, specifically in the handling of the 'packageimage' argument. This flaw allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:H/UI:N). The vulnerability permits an attacker with high privileges (PR:H) to upload arbitrary files to the server, potentially leading to remote code execution or unauthorized modification of server files. The CVSS score of 5.1 reflects a medium impact primarily due to the requirement of high privileges for exploitation, limited confidentiality, integrity, and availability impact, and no user interaction needed. Although no public exploits are currently known to be in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of patches or mitigation links suggests that the vendor has not yet released an official fix, making timely remediation critical. The unrestricted upload vulnerability can be leveraged to upload malicious scripts or web shells, which could compromise the server, escalate privileges, or pivot to other internal systems. Given the administrative context of the vulnerable script, the attack surface is limited to users with elevated access, but the consequences of exploitation remain significant for the affected system's security posture.
Potential Impact
For European organizations using Projectworlds Online Tours and Travels version 1.0, this vulnerability poses a tangible risk of server compromise through unauthorized file uploads. Since exploitation requires high privileges, the immediate threat is primarily to organizations with weak internal access controls or compromised administrative accounts. Successful exploitation could lead to unauthorized code execution, data breaches, defacement, or service disruption, impacting confidentiality, integrity, and availability of the affected systems. Tourism and travel companies in Europe relying on this software could face operational disruptions, reputational damage, and regulatory consequences under GDPR if customer data is exposed. Additionally, attackers could leverage the compromised servers as footholds for lateral movement within corporate networks. The medium severity rating suggests that while the vulnerability is not trivial, it is not easily exploitable by external attackers without prior access, somewhat limiting its impact. However, the public disclosure increases the urgency for European organizations to assess and mitigate this risk promptly to prevent potential exploitation.
Mitigation Recommendations
European organizations should immediately audit and restrict administrative access to the Projectworlds Online Tours and Travels application, ensuring that only trusted personnel have high privilege accounts. Implement strict access controls and multi-factor authentication for administrative interfaces to reduce the risk of credential compromise. Since no official patch is currently available, organizations should consider temporary mitigations such as disabling or restricting access to the /admin/change-image.php endpoint, implementing web application firewall (WAF) rules to detect and block suspicious file upload attempts, and validating or sanitizing uploaded files at the application or server level to prevent execution of malicious payloads. Regularly monitor server logs and file system changes for indicators of compromise. Organizations should also engage with the vendor for updates on patch availability and apply fixes promptly once released. Conducting internal penetration testing focused on file upload functionalities can help identify similar weaknesses. Finally, maintaining robust network segmentation can limit the impact of a potential compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-11103: Unrestricted Upload in Projectworlds Online Tours and Travels
Description
A security vulnerability has been detected in Projectworlds Online Tours and Travels 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/change-image.php. The manipulation of the argument packageimage leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-11103 is a medium-severity security vulnerability identified in version 1.0 of Projectworlds' Online Tours and Travels application. The vulnerability exists in the /admin/change-image.php file, specifically in the handling of the 'packageimage' argument. This flaw allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:H/UI:N). The vulnerability permits an attacker with high privileges (PR:H) to upload arbitrary files to the server, potentially leading to remote code execution or unauthorized modification of server files. The CVSS score of 5.1 reflects a medium impact primarily due to the requirement of high privileges for exploitation, limited confidentiality, integrity, and availability impact, and no user interaction needed. Although no public exploits are currently known to be in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The lack of patches or mitigation links suggests that the vendor has not yet released an official fix, making timely remediation critical. The unrestricted upload vulnerability can be leveraged to upload malicious scripts or web shells, which could compromise the server, escalate privileges, or pivot to other internal systems. Given the administrative context of the vulnerable script, the attack surface is limited to users with elevated access, but the consequences of exploitation remain significant for the affected system's security posture.
Potential Impact
For European organizations using Projectworlds Online Tours and Travels version 1.0, this vulnerability poses a tangible risk of server compromise through unauthorized file uploads. Since exploitation requires high privileges, the immediate threat is primarily to organizations with weak internal access controls or compromised administrative accounts. Successful exploitation could lead to unauthorized code execution, data breaches, defacement, or service disruption, impacting confidentiality, integrity, and availability of the affected systems. Tourism and travel companies in Europe relying on this software could face operational disruptions, reputational damage, and regulatory consequences under GDPR if customer data is exposed. Additionally, attackers could leverage the compromised servers as footholds for lateral movement within corporate networks. The medium severity rating suggests that while the vulnerability is not trivial, it is not easily exploitable by external attackers without prior access, somewhat limiting its impact. However, the public disclosure increases the urgency for European organizations to assess and mitigate this risk promptly to prevent potential exploitation.
Mitigation Recommendations
European organizations should immediately audit and restrict administrative access to the Projectworlds Online Tours and Travels application, ensuring that only trusted personnel have high privilege accounts. Implement strict access controls and multi-factor authentication for administrative interfaces to reduce the risk of credential compromise. Since no official patch is currently available, organizations should consider temporary mitigations such as disabling or restricting access to the /admin/change-image.php endpoint, implementing web application firewall (WAF) rules to detect and block suspicious file upload attempts, and validating or sanitizing uploaded files at the application or server level to prevent execution of malicious payloads. Regularly monitor server logs and file system changes for indicators of compromise. Organizations should also engage with the vendor for updates on patch availability and apply fixes promptly once released. Conducting internal penetration testing focused on file upload functionalities can help identify similar weaknesses. Finally, maintaining robust network segmentation can limit the impact of a potential compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-27T17:16:02.334Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d917a2208e12cbe8df394b
Added to database: 9/28/2025, 11:10:26 AM
Last enriched: 9/28/2025, 11:10:47 AM
Last updated: 9/28/2025, 1:08:29 PM
Views: 4
Related Threats
CVE-2025-11108: SQL Injection in code-projects Simple Scheduling System
MediumCVE-2025-11107: SQL Injection in code-projects Simple Scheduling System
MediumCVE-2025-11105: SQL Injection in code-projects Simple Scheduling System
MediumCVE-2025-11104: SQL Injection in CodeAstro Electricity Billing System
MediumCVE-2025-11101: SQL Injection in itsourcecode Open Source Job Portal
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.