CVE-2025-7547: Unrestricted Upload in Campcodes Online Movie Theater Seat Reservation System
A vulnerability, which was classified as critical, was found in Campcodes Online Movie Theater Seat Reservation System 1.0. This affects the function save_movie of the file /admin/admin_class.php. The manipulation of the argument cover leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7547 is a vulnerability identified in version 1.0 of the Campcodes Online Movie Theater Seat Reservation System. The flaw exists in the 'save_movie' function within the /admin/admin_class.php file. Specifically, the vulnerability arises from improper handling of the 'cover' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can remotely upload arbitrary files to the server without authentication or user interaction. Such unrestricted upload vulnerabilities are critical because they can enable attackers to upload malicious scripts or executables, potentially leading to remote code execution, server compromise, data theft, or service disruption. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of remote exploitation without privileges or user interaction, but with limited impact on confidentiality, integrity, and availability (low to limited impact vectors). The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit. However, the impact on confidentiality, integrity, and availability is assessed as low to limited, possibly due to constraints in the application environment or mitigations in place. The lack of available patches or vendor advisories at this time increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations using the Campcodes Online Movie Theater Seat Reservation System version 1.0, this vulnerability poses a significant risk. Successful exploitation could allow attackers to upload malicious files, potentially leading to unauthorized access, data breaches involving customer information, or disruption of reservation services. Given that this system is likely used by entertainment venues, cinemas, or event organizers, an attack could result in operational downtime, reputational damage, and financial losses due to service unavailability or data compromise. Furthermore, if the uploaded files enable remote code execution, attackers could pivot within the network, threatening broader organizational assets. The public disclosure of the vulnerability increases the risk of opportunistic attacks, especially in the absence of patches. European data protection regulations such as GDPR impose strict requirements on protecting personal data, so exploitation leading to data breaches could also result in regulatory penalties and legal consequences. The impact is particularly relevant for organizations with high customer volumes or those integrated with payment processing systems, where confidentiality and integrity of data are paramount.
Mitigation Recommendations
Since no official patches or vendor advisories are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /admin/ directory and the 'save_movie' function via network segmentation and firewall rules to limit exposure to trusted administrators only. 2) Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts, especially those targeting the 'cover' parameter. 3) Conducting manual code reviews or temporary code modifications to validate and sanitize the 'cover' input, restricting allowed file types and sizes to prevent arbitrary uploads. 4) Monitoring server logs for unusual upload activity or unexpected file creations in the application directories. 5) Employing intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. 6) Planning for rapid deployment of vendor patches once available and maintaining an incident response plan tailored to web application compromises. 7) Educating administrative users about the risk and enforcing strong authentication and access controls to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Austria
CVE-2025-7547: Unrestricted Upload in Campcodes Online Movie Theater Seat Reservation System
Description
A vulnerability, which was classified as critical, was found in Campcodes Online Movie Theater Seat Reservation System 1.0. This affects the function save_movie of the file /admin/admin_class.php. The manipulation of the argument cover leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7547 is a vulnerability identified in version 1.0 of the Campcodes Online Movie Theater Seat Reservation System. The flaw exists in the 'save_movie' function within the /admin/admin_class.php file. Specifically, the vulnerability arises from improper handling of the 'cover' argument, which allows an attacker to perform an unrestricted file upload. This means that an attacker can remotely upload arbitrary files to the server without authentication or user interaction. Such unrestricted upload vulnerabilities are critical because they can enable attackers to upload malicious scripts or executables, potentially leading to remote code execution, server compromise, data theft, or service disruption. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 base score is 6.9, categorized as medium severity, reflecting the ease of remote exploitation without privileges or user interaction, but with limited impact on confidentiality, integrity, and availability (low to limited impact vectors). The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit. However, the impact on confidentiality, integrity, and availability is assessed as low to limited, possibly due to constraints in the application environment or mitigations in place. The lack of available patches or vendor advisories at this time increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations using the Campcodes Online Movie Theater Seat Reservation System version 1.0, this vulnerability poses a significant risk. Successful exploitation could allow attackers to upload malicious files, potentially leading to unauthorized access, data breaches involving customer information, or disruption of reservation services. Given that this system is likely used by entertainment venues, cinemas, or event organizers, an attack could result in operational downtime, reputational damage, and financial losses due to service unavailability or data compromise. Furthermore, if the uploaded files enable remote code execution, attackers could pivot within the network, threatening broader organizational assets. The public disclosure of the vulnerability increases the risk of opportunistic attacks, especially in the absence of patches. European data protection regulations such as GDPR impose strict requirements on protecting personal data, so exploitation leading to data breaches could also result in regulatory penalties and legal consequences. The impact is particularly relevant for organizations with high customer volumes or those integrated with payment processing systems, where confidentiality and integrity of data are paramount.
Mitigation Recommendations
Since no official patches or vendor advisories are currently available, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /admin/ directory and the 'save_movie' function via network segmentation and firewall rules to limit exposure to trusted administrators only. 2) Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts, especially those targeting the 'cover' parameter. 3) Conducting manual code reviews or temporary code modifications to validate and sanitize the 'cover' input, restricting allowed file types and sizes to prevent arbitrary uploads. 4) Monitoring server logs for unusual upload activity or unexpected file creations in the application directories. 5) Employing intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. 6) Planning for rapid deployment of vendor patches once available and maintaining an incident response plan tailored to web application compromises. 7) Educating administrative users about the risk and enforcing strong authentication and access controls to reduce the attack surface.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-12T17:02:28.848Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687433a7a83201eaacbf2bef
Added to database: 7/13/2025, 10:31:03 PM
Last enriched: 7/13/2025, 10:46:11 PM
Last updated: 7/15/2025, 10:32:31 PM
Views: 6
Related Threats
CVE-2025-6981: CWE-863 Incorrect Authorization in GitHub Enterprise Server
MediumCVE-2025-49841: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
HighCVE-2025-49840: CWE-502: Deserialization of Untrusted Data in RVC-Boss GPT-SoVITS
HighCVE-2025-30761: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Oracle Java SE
MediumCVE-2025-49836: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in RVC-Boss GPT-SoVITS
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.