Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13238: Unrestricted Upload in Bdtask Flight Booking Software

0
Medium
VulnerabilityCVE-2025-13238cvecve-2025-13238
Published: Sun Nov 16 2025 (11/16/2025, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Bdtask
Product: Flight Booking Software

Description

A weakness has been identified in Bdtask Flight Booking Software 4. Affected by this vulnerability is an unknown functionality of the file /agent/profile/edit of the component Edit Profile Page. This manipulation causes unrestricted upload. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:22:53 UTC

Technical Analysis

CVE-2025-13238 identifies an unrestricted file upload vulnerability in Bdtask Flight Booking Software version 4, specifically within the /agent/profile/edit functionality of the Edit Profile Page component. This vulnerability allows an attacker with limited privileges to remotely upload files without sufficient validation or restriction. The absence of proper file type or content checks enables malicious actors to upload executable scripts or malware, potentially leading to remote code execution, privilege escalation, or persistent backdoors within the affected system. The attack vector is network-based, requiring no user interaction, and can be initiated remotely, increasing its risk profile. The CVSS 4.0 vector indicates no authentication is required (PR:L means low privileges), no user interaction, and low complexity, but with limited confidentiality, integrity, and availability impact. Despite the vendor being contacted early, no patch or mitigation guidance has been provided, and no known exploits have been observed in the wild yet. The public disclosure of the exploit code increases the likelihood of future attacks, especially targeting organizations that have not implemented compensating controls. This vulnerability is critical for organizations relying on Bdtask Flight Booking Software for travel booking and management, as exploitation could lead to unauthorized system access and data compromise.

Potential Impact

The unrestricted upload vulnerability can have significant impacts on organizations using Bdtask Flight Booking Software. Attackers could upload malicious files such as web shells or ransomware, leading to unauthorized remote code execution, data theft, or service disruption. This could compromise the confidentiality and integrity of sensitive customer and business data, including personal and payment information. Additionally, attackers might leverage this access to pivot within the network, escalating privileges or deploying further malware. The lack of vendor response and patch increases the window of exposure, raising the risk of exploitation over time. Organizations in the travel and booking sectors could face reputational damage, regulatory penalties, and operational downtime if exploited. Although no widespread exploitation is reported yet, the public availability of exploit code means attackers can readily weaponize this vulnerability.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement immediate compensating controls. First, restrict access to the /agent/profile/edit endpoint to trusted users and IP addresses via network segmentation or web application firewall (WAF) rules. Implement strict input validation and file type restrictions at the application or proxy level to block unauthorized file uploads. Monitor logs for unusual upload activity or unexpected file types. Employ runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect and block malicious payload execution. Regularly back up critical data and ensure backups are isolated from the main network. If possible, consider temporarily disabling the vulnerable functionality until a vendor patch is available. Engage with the vendor for updates and monitor threat intelligence feeds for emerging exploit activity. Conduct security awareness training for administrators to recognize signs of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-15T06:33:51.549Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69196324d6c6237fbda66dc1

Added to database: 11/16/2025, 5:37:40 AM

Last enriched: 2/24/2026, 10:22:53 PM

Last updated: 3/26/2026, 8:10:11 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses