Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67963: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ovatheme Movie Booking

0
High
VulnerabilityCVE-2025-67963cvecve-2025-67963
Published: Thu Jan 22 2026 (01/22/2026, 16:51:58 UTC)
Source: CVE Database V5
Vendor/Project: ovatheme
Product: Movie Booking

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ovatheme Movie Booking movie-booking allows Path Traversal.This issue affects Movie Booking: from n/a through <= 1.1.5.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:37:30 UTC

Technical Analysis

CVE-2025-67963 is a path traversal vulnerability identified in the ovatheme Movie Booking software, affecting versions up to and including 1.1.5. Path traversal vulnerabilities occur when an application improperly restricts user-supplied file path inputs, allowing attackers to navigate outside the intended directory structure. In this case, the vulnerability enables unauthenticated remote attackers to craft specially designed requests that manipulate file paths to access restricted directories on the server. Although the vulnerability does not directly compromise confidentiality or integrity, it can lead to denial of service (availability impact) by causing the application or server to behave unexpectedly or crash when accessing unauthorized files or directories. The CVSS score of 8.6 (high) reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change, indicating that the vulnerability affects components beyond the initially vulnerable software. No public exploits are known at this time, but the potential for exploitation remains significant due to the ease of attack and the critical nature of availability in booking systems. The vulnerability was reserved in December 2025 and published in January 2026, indicating recent discovery. The lack of available patches at the time of reporting necessitates immediate attention to mitigation strategies. The affected product is primarily used in the entertainment and booking sectors, which are critical for customer-facing services and revenue generation.

Potential Impact

For European organizations, especially those in the entertainment, hospitality, and event management sectors using the ovatheme Movie Booking software, this vulnerability poses a significant risk to service availability. Disruption of booking services can lead to financial losses, reputational damage, and customer dissatisfaction. Since the vulnerability allows unauthenticated remote exploitation, attackers can launch denial of service attacks without needing credentials or user interaction, increasing the risk of widespread disruption. Additionally, unauthorized access to restricted directories could potentially expose sensitive configuration or system files, indirectly aiding further attacks. Countries with large tourism industries and digital entertainment markets may experience higher impact due to the reliance on such booking platforms. The vulnerability could also affect supply chain partners or service providers integrated with the affected software, amplifying the impact across interconnected organizations.

Mitigation Recommendations

Organizations should immediately monitor for unusual access patterns or attempts to exploit path traversal in their Movie Booking installations. Until an official patch is released, implement strict input validation and sanitization on all user-supplied file path parameters to prevent directory traversal sequences (e.g., '../'). Employ web application firewalls (WAFs) with rules designed to detect and block path traversal attempts targeting the affected endpoints. Restrict file system permissions for the application to the minimum necessary, ensuring it cannot access sensitive directories outside its designated scope. Conduct thorough security reviews of the deployment environment and consider isolating the application in a sandbox or container to limit potential damage. Maintain regular backups and incident response plans to quickly recover from potential denial of service incidents. Once patches become available from ovatheme, prioritize their deployment in all affected environments. Additionally, communicate with third-party vendors and partners to ensure they are aware of the vulnerability and mitigation steps.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:23.851Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259174623b1157c7faec4

Added to database: 1/22/2026, 5:06:31 PM

Last enriched: 1/30/2026, 8:37:30 AM

Last updated: 2/5/2026, 10:54:06 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats