CVE-2025-47498: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in nicdark Hotel Booking
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nicdark Hotel Booking allows PHP Local File Inclusion. This issue affects Hotel Booking: from n/a through 3.6.
AI Analysis
Technical Summary
CVE-2025-47498 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the nicdark Hotel Booking software up to version 3.6. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter used in include or require statements. This can lead to the inclusion and execution of arbitrary files on the server, potentially exposing sensitive information, executing malicious code, or escalating privileges. The vulnerability is remotely exploitable over the network (AV:N), but requires a high level of attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to full compromise of the affected system. No public exploits are currently known in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in file inclusion functions, a common PHP security issue that can be exploited to read arbitrary files, execute code, or perform other malicious actions depending on server configuration and file permissions.
Potential Impact
For European organizations using the nicdark Hotel Booking system, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of customer data, including personal and payment information, violating GDPR and other data protection regulations. The integrity of booking data and system configurations could be compromised, potentially disrupting operations and damaging trust. Availability could also be affected if attackers execute denial-of-service actions or deploy ransomware. Given the hospitality sector's importance in Europe, especially in countries with large tourism industries, such an attack could have financial and reputational consequences. Additionally, the low privilege requirement means that even limited access attackers or automated scanning tools could attempt exploitation, increasing the risk of compromise. The lack of public exploits currently provides a window for mitigation, but the high impact necessitates prompt action.
Mitigation Recommendations
Organizations should immediately audit their use of nicdark Hotel Booking software and identify affected versions. Until an official patch is released, mitigations include: 1) Implement strict input validation and sanitization on all parameters used in include or require statements to prevent injection of malicious file paths. 2) Employ web application firewalls (WAFs) with rules designed to detect and block attempts at local file inclusion attacks. 3) Restrict file system permissions to limit the web server's access to only necessary directories, preventing unauthorized file access. 4) Disable PHP functions that facilitate file inclusion from user input where possible or use allowlists for included files. 5) Monitor logs for suspicious requests targeting file inclusion parameters. 6) Plan for rapid deployment of patches once available from nicdark. 7) Conduct security awareness training for developers and administrators on secure coding practices related to file inclusion.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Austria, Switzerland
CVE-2025-47498: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in nicdark Hotel Booking
Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nicdark Hotel Booking allows PHP Local File Inclusion. This issue affects Hotel Booking: from n/a through 3.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-47498 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the nicdark Hotel Booking software up to version 3.6. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter used in include or require statements. This can lead to the inclusion and execution of arbitrary files on the server, potentially exposing sensitive information, executing malicious code, or escalating privileges. The vulnerability is remotely exploitable over the network (AV:N), but requires a high level of attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to full compromise of the affected system. No public exploits are currently known in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in file inclusion functions, a common PHP security issue that can be exploited to read arbitrary files, execute code, or perform other malicious actions depending on server configuration and file permissions.
Potential Impact
For European organizations using the nicdark Hotel Booking system, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of customer data, including personal and payment information, violating GDPR and other data protection regulations. The integrity of booking data and system configurations could be compromised, potentially disrupting operations and damaging trust. Availability could also be affected if attackers execute denial-of-service actions or deploy ransomware. Given the hospitality sector's importance in Europe, especially in countries with large tourism industries, such an attack could have financial and reputational consequences. Additionally, the low privilege requirement means that even limited access attackers or automated scanning tools could attempt exploitation, increasing the risk of compromise. The lack of public exploits currently provides a window for mitigation, but the high impact necessitates prompt action.
Mitigation Recommendations
Organizations should immediately audit their use of nicdark Hotel Booking software and identify affected versions. Until an official patch is released, mitigations include: 1) Implement strict input validation and sanitization on all parameters used in include or require statements to prevent injection of malicious file paths. 2) Employ web application firewalls (WAFs) with rules designed to detect and block attempts at local file inclusion attacks. 3) Restrict file system permissions to limit the web server's access to only necessary directories, preventing unauthorized file access. 4) Disable PHP functions that facilitate file inclusion from user input where possible or use allowlists for included files. 5) Monitor logs for suspicious requests targeting file inclusion parameters. 6) Plan for rapid deployment of patches once available from nicdark. 7) Conduct security awareness training for developers and administrators on secure coding practices related to file inclusion.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T09:39:23.016Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd9544
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 12:27:47 PM
Last updated: 7/31/2025, 11:56:03 AM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.