CVE-2025-9051: SQL Injection in projectworlds Travel Management System
A vulnerability was determined in projectworlds Travel Management System 1.0. Affected by this issue is some unknown functionality of the file /updatecategory.php. The manipulation of the argument t1 leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-9051 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Travel Management System. The flaw exists in the /updatecategory.php file, specifically in the handling of the 't1' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the affected system. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (no privileges or user interaction needed) but limited scope and impact (partial confidentiality, integrity, and availability impact). No patches or fixes have been published yet, and no known exploits are currently observed in the wild, but the exploit details have been publicly disclosed, increasing the risk of future exploitation. The vulnerability affects only version 1.0 of the Travel Management System, which is a niche product used for managing travel-related operations, likely including booking, scheduling, and category management.
Potential Impact
For European organizations using projectworlds Travel Management System 1.0, this vulnerability poses a significant risk to sensitive travel management data. Exploitation could lead to unauthorized disclosure of customer travel details, modification of travel categories or bookings, and disruption of travel operations. This could result in operational downtime, loss of customer trust, regulatory non-compliance (especially under GDPR due to potential personal data exposure), and financial losses. Given the remote and unauthenticated nature of the attack, threat actors could easily target exposed systems, including those hosted on-premises or in cloud environments. Organizations in sectors such as travel agencies, corporate travel departments, and tourism service providers in Europe are particularly at risk. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still can cause meaningful damage if exploited.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify any deployments of projectworlds Travel Management System version 1.0. Since no official patch is currently available, organizations should implement compensating controls such as: 1) Restricting network access to the /updatecategory.php endpoint using web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 't1' parameter. 2) Employ input validation and sanitization at the application or proxy level to reject suspicious input. 3) Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 4) Consider isolating or decommissioning the vulnerable system if feasible until a patch is released. 5) Engage with the vendor for timelines on patch availability and apply updates promptly once released. 6) Conduct security awareness training for IT staff to recognize and respond to exploitation attempts. These targeted mitigations go beyond generic advice by focusing on immediate risk reduction through network controls and monitoring while awaiting vendor remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-9051: SQL Injection in projectworlds Travel Management System
Description
A vulnerability was determined in projectworlds Travel Management System 1.0. Affected by this issue is some unknown functionality of the file /updatecategory.php. The manipulation of the argument t1 leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9051 is a SQL Injection vulnerability identified in version 1.0 of the projectworlds Travel Management System. The flaw exists in the /updatecategory.php file, specifically in the handling of the 't1' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it accessible to any attacker with network access to the affected system. The injection can lead to unauthorized data access, modification, or deletion, potentially compromising the confidentiality, integrity, and availability of the system's data. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (no privileges or user interaction needed) but limited scope and impact (partial confidentiality, integrity, and availability impact). No patches or fixes have been published yet, and no known exploits are currently observed in the wild, but the exploit details have been publicly disclosed, increasing the risk of future exploitation. The vulnerability affects only version 1.0 of the Travel Management System, which is a niche product used for managing travel-related operations, likely including booking, scheduling, and category management.
Potential Impact
For European organizations using projectworlds Travel Management System 1.0, this vulnerability poses a significant risk to sensitive travel management data. Exploitation could lead to unauthorized disclosure of customer travel details, modification of travel categories or bookings, and disruption of travel operations. This could result in operational downtime, loss of customer trust, regulatory non-compliance (especially under GDPR due to potential personal data exposure), and financial losses. Given the remote and unauthenticated nature of the attack, threat actors could easily target exposed systems, including those hosted on-premises or in cloud environments. Organizations in sectors such as travel agencies, corporate travel departments, and tourism service providers in Europe are particularly at risk. The medium severity rating suggests that while the vulnerability is serious, it may not lead to full system compromise but still can cause meaningful damage if exploited.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify any deployments of projectworlds Travel Management System version 1.0. Since no official patch is currently available, organizations should implement compensating controls such as: 1) Restricting network access to the /updatecategory.php endpoint using web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 't1' parameter. 2) Employ input validation and sanitization at the application or proxy level to reject suspicious input. 3) Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 4) Consider isolating or decommissioning the vulnerable system if feasible until a patch is released. 5) Engage with the vendor for timelines on patch availability and apply updates promptly once released. 6) Conduct security awareness training for IT staff to recognize and respond to exploitation attempts. These targeted mitigations go beyond generic advice by focusing on immediate risk reduction through network controls and monitoring while awaiting vendor remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-14T19:34:13.348Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689f2570ad5a09ad006c45f1
Added to database: 8/15/2025, 12:17:52 PM
Last enriched: 8/15/2025, 12:34:02 PM
Last updated: 11/10/2025, 3:42:16 AM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12928: SQL Injection in code-projects Online Job Search Engine
MediumCVE-2025-12868: CWE-603 Use of Client-Side Authentication in CyberTutor New Site Server
CriticalCVE-2025-12867: CWE-434 Unrestricted Upload of File with Dangerous Type in Hundred Plus EIP Plus
HighCVE-2025-12927: SQL Injection in DedeBIZ
MediumCVE-2025-12866: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in Hundred Plus EIP Plus
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.