CVE-2025-12223: Unrestricted Upload in Bdtask Flight Booking Software
A vulnerability was detected in Bdtask Flight Booking Software up to 3.1. This affects an unknown part of the file /b2c/package-information of the component Package Information Module. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-12223 identifies an unrestricted file upload vulnerability in Bdtask Flight Booking Software versions 3.0 and 3.1, specifically within the Package Information Module accessed via the /b2c/package-information endpoint. This flaw allows remote attackers to upload arbitrary files without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability arises from insufficient validation or restrictions on uploaded file types and content, enabling attackers to potentially upload malicious scripts or executables. Exploitation could lead to remote code execution, unauthorized access, or system compromise, threatening confidentiality, integrity, and availability of affected systems. The CVSS score of 5.3 (medium) reflects the moderate impact and ease of exploitation without user interaction but requiring low privileges. The vendor has not issued any patches or responded to disclosure attempts, and while no active exploitation is currently known, the public availability of the exploit increases risk. The affected software is used in flight booking environments, which handle sensitive customer data and critical business operations, making this vulnerability significant for organizations relying on this product.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive customer information, including personal and payment data, leading to privacy violations and regulatory non-compliance (e.g., GDPR). Attackers could deploy web shells or malware, causing service disruptions or enabling lateral movement within networks. This could damage the reputation of travel agencies and airlines using the software, potentially causing financial losses and operational downtime. Given the critical role of flight booking systems in the travel sector, disruptions could cascade to affect customer trust and business continuity. The medium severity rating suggests a moderate but tangible risk, especially in environments lacking compensating controls. The absence of vendor patches necessitates proactive defensive measures to mitigate potential exploitation.
Mitigation Recommendations
Organizations should immediately implement strict file upload validation controls, including whitelisting allowed file types, enforcing file size limits, and scanning uploads for malware. Network segmentation should isolate the flight booking software from critical infrastructure to limit attacker movement. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts targeting the /b2c/package-information endpoint. Monitor logs for unusual activity related to file uploads and access patterns. Restrict privileges of the application process to minimize impact if exploited. Consider deploying virtual patching or compensating controls until an official patch is released. Engage with the vendor for updates and track threat intelligence sources for emerging exploit activity. Conduct regular security assessments and penetration tests focused on file upload mechanisms.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-12223: Unrestricted Upload in Bdtask Flight Booking Software
Description
A vulnerability was detected in Bdtask Flight Booking Software up to 3.1. This affects an unknown part of the file /b2c/package-information of the component Package Information Module. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-12223 identifies an unrestricted file upload vulnerability in Bdtask Flight Booking Software versions 3.0 and 3.1, specifically within the Package Information Module accessed via the /b2c/package-information endpoint. This flaw allows remote attackers to upload arbitrary files without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability arises from insufficient validation or restrictions on uploaded file types and content, enabling attackers to potentially upload malicious scripts or executables. Exploitation could lead to remote code execution, unauthorized access, or system compromise, threatening confidentiality, integrity, and availability of affected systems. The CVSS score of 5.3 (medium) reflects the moderate impact and ease of exploitation without user interaction but requiring low privileges. The vendor has not issued any patches or responded to disclosure attempts, and while no active exploitation is currently known, the public availability of the exploit increases risk. The affected software is used in flight booking environments, which handle sensitive customer data and critical business operations, making this vulnerability significant for organizations relying on this product.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive customer information, including personal and payment data, leading to privacy violations and regulatory non-compliance (e.g., GDPR). Attackers could deploy web shells or malware, causing service disruptions or enabling lateral movement within networks. This could damage the reputation of travel agencies and airlines using the software, potentially causing financial losses and operational downtime. Given the critical role of flight booking systems in the travel sector, disruptions could cascade to affect customer trust and business continuity. The medium severity rating suggests a moderate but tangible risk, especially in environments lacking compensating controls. The absence of vendor patches necessitates proactive defensive measures to mitigate potential exploitation.
Mitigation Recommendations
Organizations should immediately implement strict file upload validation controls, including whitelisting allowed file types, enforcing file size limits, and scanning uploads for malware. Network segmentation should isolate the flight booking software from critical infrastructure to limit attacker movement. Employ web application firewalls (WAFs) to detect and block suspicious upload attempts targeting the /b2c/package-information endpoint. Monitor logs for unusual activity related to file uploads and access patterns. Restrict privileges of the application process to minimize impact if exploited. Consider deploying virtual patching or compensating controls until an official patch is released. Engage with the vendor for updates and track threat intelligence sources for emerging exploit activity. Conduct regular security assessments and penetration tests focused on file upload mechanisms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-25T16:21:51.792Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ff0129748f7c5f7c9e45b7
Added to database: 10/27/2025, 5:20:41 AM
Last enriched: 11/3/2025, 6:10:51 AM
Last updated: 12/11/2025, 4:31:24 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14522: Unrestricted Upload in baowzh hfly
MediumCVE-2025-14521: Path Traversal in baowzh hfly
MediumCVE-2025-55314: n/a
HighCVE-2025-55313: n/a
HighCVE-2025-55312: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.