CVE-2025-12222: Unrestricted Upload in Bdtask Flight Booking Software
A security vulnerability has been detected in Bdtask Flight Booking Software up to 3.1. Affected by this issue is some unknown functionality of the file /admin/transaction/deposit of the component Deposit Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12222 identifies an unrestricted file upload vulnerability in Bdtask Flight Booking Software versions 3.0 and 3.1, specifically within the /admin/transaction/deposit endpoint of the Deposit Handler component. This flaw allows remote attackers to upload arbitrary files without requiring authentication or user interaction, which can lead to remote code execution, data manipulation, or denial of service. The vulnerability arises from insufficient validation and sanitization of uploaded files, enabling attackers to bypass restrictions and place malicious payloads on the server. The vendor was notified early but has not issued a patch or response, increasing the risk exposure. The CVSS 4.0 base score is 5.3 (medium), reflecting the lack of required authentication and low attack complexity, but limited impact on confidentiality, integrity, and availability individually. However, combined, these impacts can be significant if exploited. No known exploits are currently active in the wild, but public disclosure increases the likelihood of future exploitation. The software is used in flight booking systems, which are critical for travel operations and customer data management, making this vulnerability a notable risk for organizations relying on this product.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access and control over flight booking platforms, potentially leading to data breaches involving sensitive customer information such as personal identification and payment details. Exploitation could result in service disruption, undermining trust in travel services and causing financial losses. The ability to upload arbitrary files remotely without authentication increases the risk of server compromise, malware deployment, and lateral movement within networks. Given the critical role of flight booking systems in the travel and tourism industry, affected organizations may face regulatory penalties under GDPR if customer data is exposed. Additionally, disruption of booking services could impact operational continuity and customer satisfaction. The medium severity score suggests moderate risk, but the lack of vendor response and public exploit disclosure heightens urgency for European entities to assess and mitigate this threat promptly.
Mitigation Recommendations
Organizations using Bdtask Flight Booking Software versions 3.0 or 3.1 should immediately implement compensating controls such as network segmentation to isolate the affected application from sensitive internal systems. Apply strict file upload validation by enforcing file type whitelisting, size limits, and scanning uploads for malware. Restrict upload directories with minimal permissions and disable execution rights on these directories to prevent execution of uploaded malicious files. Monitor logs for unusual upload activity and implement intrusion detection systems to detect exploitation attempts. If possible, replace or upgrade the software to a version without this vulnerability once available. In absence of a vendor patch, consider deploying web application firewalls (WAFs) with custom rules to block suspicious upload requests targeting the /admin/transaction/deposit endpoint. Conduct regular security assessments and penetration tests focusing on file upload functionalities. Finally, maintain an incident response plan tailored to potential exploitation scenarios involving this vulnerability.
Affected Countries
Germany, France, United Kingdom, Spain, Italy, Netherlands, Belgium
CVE-2025-12222: Unrestricted Upload in Bdtask Flight Booking Software
Description
A security vulnerability has been detected in Bdtask Flight Booking Software up to 3.1. Affected by this issue is some unknown functionality of the file /admin/transaction/deposit of the component Deposit Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-12222 identifies an unrestricted file upload vulnerability in Bdtask Flight Booking Software versions 3.0 and 3.1, specifically within the /admin/transaction/deposit endpoint of the Deposit Handler component. This flaw allows remote attackers to upload arbitrary files without requiring authentication or user interaction, which can lead to remote code execution, data manipulation, or denial of service. The vulnerability arises from insufficient validation and sanitization of uploaded files, enabling attackers to bypass restrictions and place malicious payloads on the server. The vendor was notified early but has not issued a patch or response, increasing the risk exposure. The CVSS 4.0 base score is 5.3 (medium), reflecting the lack of required authentication and low attack complexity, but limited impact on confidentiality, integrity, and availability individually. However, combined, these impacts can be significant if exploited. No known exploits are currently active in the wild, but public disclosure increases the likelihood of future exploitation. The software is used in flight booking systems, which are critical for travel operations and customer data management, making this vulnerability a notable risk for organizations relying on this product.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access and control over flight booking platforms, potentially leading to data breaches involving sensitive customer information such as personal identification and payment details. Exploitation could result in service disruption, undermining trust in travel services and causing financial losses. The ability to upload arbitrary files remotely without authentication increases the risk of server compromise, malware deployment, and lateral movement within networks. Given the critical role of flight booking systems in the travel and tourism industry, affected organizations may face regulatory penalties under GDPR if customer data is exposed. Additionally, disruption of booking services could impact operational continuity and customer satisfaction. The medium severity score suggests moderate risk, but the lack of vendor response and public exploit disclosure heightens urgency for European entities to assess and mitigate this threat promptly.
Mitigation Recommendations
Organizations using Bdtask Flight Booking Software versions 3.0 or 3.1 should immediately implement compensating controls such as network segmentation to isolate the affected application from sensitive internal systems. Apply strict file upload validation by enforcing file type whitelisting, size limits, and scanning uploads for malware. Restrict upload directories with minimal permissions and disable execution rights on these directories to prevent execution of uploaded malicious files. Monitor logs for unusual upload activity and implement intrusion detection systems to detect exploitation attempts. If possible, replace or upgrade the software to a version without this vulnerability once available. In absence of a vendor patch, consider deploying web application firewalls (WAFs) with custom rules to block suspicious upload requests targeting the /admin/transaction/deposit endpoint. Conduct regular security assessments and penetration tests focusing on file upload functionalities. Finally, maintain an incident response plan tailored to potential exploitation scenarios involving this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-25T16:21:44.365Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff0129748f7c5f7c9e45b1
Added to database: 10/27/2025, 5:20:41 AM
Last enriched: 11/3/2025, 6:10:37 AM
Last updated: 12/10/2025, 9:16:15 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-53741: CWE-384: Session Fixation in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter
HighCVE-2023-53740: CWE-862: Missing Authorization in DB Elettronica Telecomunicazioni SpA Screen SFT DAB Series - Compact Radio DAB Transmitter
HighCVE-2025-65832: n/a
HighCVE-2025-65831: n/a
HighCVE-2025-65830: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.