Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12223: Unrestricted Upload in Bdtask Flight Booking Software

0
Medium
VulnerabilityCVE-2025-12223cvecve-2025-12223
Published: Mon Oct 27 2025 (10/27/2025, 04:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Bdtask
Product: Flight Booking Software

Description

A vulnerability was detected in Bdtask Flight Booking Software up to 3.1. This affects an unknown part of the file /b2c/package-information of the component Package Information Module. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/03/2025, 06:10:51 UTC

Technical Analysis

CVE-2025-12223 identifies an unrestricted file upload vulnerability in Bdtask Flight Booking Software versions 3.0 and 3.1, specifically within the Package Information Module accessed via the /b2c/package-information endpoint. This flaw allows remote attackers to upload arbitrary files without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability arises from insufficient validation or restrictions on uploaded file types and content, enabling attackers to potentially upload malicious scripts or executables. Exploitation could lead to remote code execution, unauthorized access, or system compromise, threatening confidentiality, integrity, and availability of affected systems. The CVSS score of 5.3 (medium) reflects the moderate impact and ease of exploitation without user interaction but requiring low privileges. The vendor has not issued any patches or responded to disclosure attempts, and while no active exploitation is currently known, the public availability of the exploit increases risk. The affected software is used in flight booking environments, which handle sensitive customer data and critical business operations, making this vulnerability significant for organizations relying on this product.

Potential Impact

For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive customer information, including personal and payment data, leading to privacy violations and regulatory non-compliance (e.g., GDPR). Attackers could deploy web shells or malware, causing service disruptions or enabling lateral movement within networks. This could damage the reputation of travel agencies and airlines using the software, potentially causing financial losses and operational downtime. Given the critical role of flight booking systems in the travel sector, disruptions could cascade to affect customer trust and business continuity. The medium severity rating suggests a moderate but tangible risk, especially in environments lacking compensating controls. The absence of vendor patches necessitates proactive defensive measures to mitigate potential exploitation.

Mitigation Recommendations

Organizations should immediately implement strict file upload validation controls, including whitelisting allowed file types, enforcing file size limits, and scanning uploads for malware. Network segmentation should isolate the flight booking software from critical infrastructure to limit attacker movement. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts targeting the /b2c/package-information endpoint. Monitor logs for unusual activity related to file uploads and access patterns. Restrict privileges of the application process to minimize impact if exploited. Consider deploying virtual patching or compensating controls until an official patch is released. Engage with the vendor for updates and track threat intelligence sources for emerging exploit activity. Conduct regular security assessments and penetration tests focused on file upload mechanisms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T16:21:51.792Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ff0129748f7c5f7c9e45b7

Added to database: 10/27/2025, 5:20:41 AM

Last enriched: 11/3/2025, 6:10:51 AM

Last updated: 12/11/2025, 4:31:24 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats