CVE-2025-11351: Unrestricted Upload in code-projects Online Hotel Reservation System
A weakness has been identified in code-projects Online Hotel Reservation System 1.0. The impacted element is an unknown function of the file /admin/editpicexec.php. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-11351 is a vulnerability identified in version 1.0 of the code-projects Online Hotel Reservation System, specifically within the /admin/editpicexec.php file. The vulnerability arises from an unrestricted file upload flaw, where the 'image' argument can be manipulated to upload arbitrary files without sufficient validation or restriction. This flaw allows remote attackers to upload potentially malicious files, such as web shells or scripts, which can then be executed on the server, leading to remote code execution or further system compromise. The vulnerability requires low privileges (PR:L) but does not require user interaction (UI:N) or authentication tokens (AT:N), making it easier to exploit remotely. The CVSS 4.0 base score is 5.3, reflecting medium severity, with network attack vector (AV:N), low complexity (AC:L), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits are reported in the wild, the availability of public exploit code increases the likelihood of exploitation attempts. The vulnerability is particularly critical in the hospitality sector where the affected software is deployed, as compromise could lead to data breaches, service disruption, or unauthorized access to customer and business data. No official patches or fixes have been published yet, emphasizing the need for immediate mitigation measures by administrators.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors using the affected Online Hotel Reservation System, this vulnerability poses significant risks. Successful exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, undermining confidentiality. Attackers could also execute arbitrary code on the server, compromising system integrity and potentially disrupting availability of reservation services. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The medium severity rating suggests a moderate but tangible threat, particularly as the exploit requires only low privileges and no user interaction. Organizations with limited security controls or outdated software are at higher risk. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks targeting vulnerable installations across Europe.
Mitigation Recommendations
To mitigate CVE-2025-11351, organizations should immediately implement strict server-side validation of all file uploads, ensuring only allowed file types and sizes are accepted. Employ whitelist filtering for file extensions and MIME types, and verify file contents to prevent disguised malicious files. Restrict upload functionality to trusted, authenticated administrators only, and enforce the principle of least privilege on user accounts. Implement robust access controls and isolate upload directories from executable paths to prevent execution of uploaded files. Monitor server logs and file system changes for suspicious upload activity. If possible, apply web application firewalls (WAFs) with rules to detect and block malicious upload attempts. Since no official patch is currently available, consider temporary mitigations such as disabling the vulnerable upload functionality or restricting access to the /admin/editpicexec.php endpoint via network controls. Regularly audit and update the software once patches are released.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Austria, Switzerland
CVE-2025-11351: Unrestricted Upload in code-projects Online Hotel Reservation System
Description
A weakness has been identified in code-projects Online Hotel Reservation System 1.0. The impacted element is an unknown function of the file /admin/editpicexec.php. This manipulation of the argument image causes unrestricted upload. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-11351 is a vulnerability identified in version 1.0 of the code-projects Online Hotel Reservation System, specifically within the /admin/editpicexec.php file. The vulnerability arises from an unrestricted file upload flaw, where the 'image' argument can be manipulated to upload arbitrary files without sufficient validation or restriction. This flaw allows remote attackers to upload potentially malicious files, such as web shells or scripts, which can then be executed on the server, leading to remote code execution or further system compromise. The vulnerability requires low privileges (PR:L) but does not require user interaction (UI:N) or authentication tokens (AT:N), making it easier to exploit remotely. The CVSS 4.0 base score is 5.3, reflecting medium severity, with network attack vector (AV:N), low complexity (AC:L), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits are reported in the wild, the availability of public exploit code increases the likelihood of exploitation attempts. The vulnerability is particularly critical in the hospitality sector where the affected software is deployed, as compromise could lead to data breaches, service disruption, or unauthorized access to customer and business data. No official patches or fixes have been published yet, emphasizing the need for immediate mitigation measures by administrators.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors using the affected Online Hotel Reservation System, this vulnerability poses significant risks. Successful exploitation could lead to unauthorized access to sensitive customer data, including personal and payment information, undermining confidentiality. Attackers could also execute arbitrary code on the server, compromising system integrity and potentially disrupting availability of reservation services. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The medium severity rating suggests a moderate but tangible threat, particularly as the exploit requires only low privileges and no user interaction. Organizations with limited security controls or outdated software are at higher risk. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks targeting vulnerable installations across Europe.
Mitigation Recommendations
To mitigate CVE-2025-11351, organizations should immediately implement strict server-side validation of all file uploads, ensuring only allowed file types and sizes are accepted. Employ whitelist filtering for file extensions and MIME types, and verify file contents to prevent disguised malicious files. Restrict upload functionality to trusted, authenticated administrators only, and enforce the principle of least privilege on user accounts. Implement robust access controls and isolate upload directories from executable paths to prevent execution of uploaded files. Monitor server logs and file system changes for suspicious upload activity. If possible, apply web application firewalls (WAFs) with rules to detect and block malicious upload attempts. Since no official patch is currently available, consider temporary mitigations such as disabling the vulnerable upload functionality or restricting access to the /admin/editpicexec.php endpoint via network controls. Regularly audit and update the software once patches are released.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-06T06:23:52.741Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e499fd3b3ae40543e7ee7f
Added to database: 10/7/2025, 4:41:33 AM
Last enriched: 10/7/2025, 4:53:13 AM
Last updated: 10/7/2025, 5:58:54 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11353: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumCVE-2025-11362: Allocation of Resources Without Limits or Throttling in pdfmake
HighCVE-2025-11352: Unrestricted Upload in code-projects Online Hotel Reservation System
MediumCVE-2025-11350: SQL Injection in Campcodes Online Apartment Visitor Management System
MediumCVE-2025-27915: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.