Skip to main content

CVE-2025-47498: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in nicdark Hotel Booking

High
VulnerabilityCVE-2025-47498cvecve-2025-47498cwe-98
Published: Wed May 07 2025 (05/07/2025, 14:19:55 UTC)
Source: CVE
Vendor/Project: nicdark
Product: Hotel Booking

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nicdark Hotel Booking allows PHP Local File Inclusion. This issue affects Hotel Booking: from n/a through 3.6.

AI-Powered Analysis

AILast updated: 07/05/2025, 12:27:47 UTC

Technical Analysis

CVE-2025-47498 is a high-severity vulnerability classified under CWE-98, which pertains to improper control of filenames used in include or require statements within PHP programs. Specifically, this vulnerability affects the nicdark Hotel Booking software up to version 3.6. The flaw allows an attacker to perform a PHP Local File Inclusion (LFI) attack by manipulating the filename parameter used in include or require statements. This can lead to the inclusion and execution of arbitrary files on the server, potentially exposing sensitive information, executing malicious code, or escalating privileges. The vulnerability is remotely exploitable over the network (AV:N), but requires a high level of attack complexity (AC:H) and low privileges (PR:L), with no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation can lead to full compromise of the affected system. No public exploits are currently known in the wild, and no patches have been linked yet. The vulnerability arises from insufficient validation or sanitization of user-supplied input used in file inclusion functions, a common PHP security issue that can be exploited to read arbitrary files, execute code, or perform other malicious actions depending on server configuration and file permissions.

Potential Impact

For European organizations using the nicdark Hotel Booking system, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of customer data, including personal and payment information, violating GDPR and other data protection regulations. The integrity of booking data and system configurations could be compromised, potentially disrupting operations and damaging trust. Availability could also be affected if attackers execute denial-of-service actions or deploy ransomware. Given the hospitality sector's importance in Europe, especially in countries with large tourism industries, such an attack could have financial and reputational consequences. Additionally, the low privilege requirement means that even limited access attackers or automated scanning tools could attempt exploitation, increasing the risk of compromise. The lack of public exploits currently provides a window for mitigation, but the high impact necessitates prompt action.

Mitigation Recommendations

Organizations should immediately audit their use of nicdark Hotel Booking software and identify affected versions. Until an official patch is released, mitigations include: 1) Implement strict input validation and sanitization on all parameters used in include or require statements to prevent injection of malicious file paths. 2) Employ web application firewalls (WAFs) with rules designed to detect and block attempts at local file inclusion attacks. 3) Restrict file system permissions to limit the web server's access to only necessary directories, preventing unauthorized file access. 4) Disable PHP functions that facilitate file inclusion from user input where possible or use allowlists for included files. 5) Monitor logs for suspicious requests targeting file inclusion parameters. 6) Plan for rapid deployment of patches once available from nicdark. 7) Conduct security awareness training for developers and administrators on secure coding practices related to file inclusion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-05-07T09:39:23.016Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd9544

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 12:27:47 PM

Last updated: 7/31/2025, 11:56:03 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats