Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13546: SQL Injection in ashraf-kabir travel-agency

0
Medium
VulnerabilityCVE-2025-13546cvecve-2025-13546
Published: Sun Nov 23 2025 (11/23/2025, 10:32:06 UTC)
Source: CVE Database V5
Vendor/Project: ashraf-kabir
Product: travel-agency

Description

A vulnerability was detected in ashraf-kabir travel-agency up to 1f25aa03544bc5fb7a9e846f8a7879cecdb0cad3. Affected by this issue is some unknown functionality of the file /results.php of the component Search. The manipulation of the argument user_query results in sql injection. The attack can be launched remotely. The exploit is now public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

AI-Powered Analysis

AILast updated: 11/30/2025, 11:00:03 UTC

Technical Analysis

CVE-2025-13546 identifies a SQL injection vulnerability in the ashraf-kabir travel-agency software, affecting the Search component's /results.php file. The vulnerability is triggered by manipulation of the user_query parameter, which is not properly sanitized or parameterized, allowing attackers to inject arbitrary SQL commands. This flaw enables remote attackers to execute unauthorized SQL queries, potentially leading to unauthorized data access, data modification, or denial of service on the backend database. The vulnerability requires no authentication or user interaction, increasing its exploitability. However, the impact is rated as limited (low confidentiality, integrity, and availability impact) due to the nature of the affected functionality and the partial control over the database. The product does not use versioning, making it difficult to identify affected instances or apply patches. No known exploits are currently active in the wild, but public exploit code availability raises the risk of exploitation. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction needed, and low impact on confidentiality, integrity, and availability. This vulnerability poses a moderate threat to organizations relying on this software for travel-related services, especially where sensitive customer or booking data is stored. The lack of versioning complicates vulnerability management and patch deployment, increasing exposure time. Organizations should prioritize input validation, use of prepared statements, and monitoring for anomalous database queries to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2025-13546 can be significant depending on their reliance on the ashraf-kabir travel-agency software. Successful exploitation could lead to unauthorized access to customer data, including personal and booking information, potentially violating GDPR and other data protection regulations. Data integrity could be compromised, affecting booking accuracy and operational reliability. Availability impacts could disrupt service continuity, harming customer trust and business reputation. The medium severity rating reflects a balance between ease of exploitation and limited scope of damage; however, the presence of public exploit code increases the likelihood of attacks. Organizations in the travel and tourism sector, which is vital to many European economies, may face operational and regulatory risks. Additionally, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement. The absence of versioning and patch information complicates timely remediation, potentially prolonging exposure. Overall, the vulnerability poses a moderate risk to confidentiality, integrity, and availability of critical travel-related services and data within Europe.

Mitigation Recommendations

To mitigate CVE-2025-13546 effectively, European organizations should implement the following specific measures: 1) Conduct a thorough code review of the /results.php Search component to identify and sanitize all inputs, especially the user_query parameter. 2) Replace any dynamic SQL query construction with parameterized queries or prepared statements to prevent injection. 3) Implement web application firewalls (WAF) with rules targeting SQL injection patterns, particularly on the affected endpoint. 4) Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 5) Since the product lacks versioning and official patches, consider isolating or sandboxing the affected application to limit database exposure. 6) Engage with the vendor or development team to establish a patch or upgrade path, or consider migrating to alternative software with better security practices. 7) Educate developers and administrators on secure coding practices and the importance of input validation. 8) Regularly back up databases and test restoration procedures to minimize impact of potential data corruption. 9) Review and enforce least privilege principles on database accounts used by the application to limit damage scope. 10) Incorporate this vulnerability into incident response plans to enable rapid detection and containment if exploited.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-22T14:56:46.563Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6922e3a8bbe41230bc0bab7f

Added to database: 11/23/2025, 10:36:24 AM

Last enriched: 11/30/2025, 11:00:03 AM

Last updated: 1/8/2026, 2:30:34 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats