CVE-2025-9153: Unrestricted Upload in itsourcecode Online Tour and Travel Management System
A vulnerability was detected in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/travellers.php. The manipulation of the argument photo results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-9153 is a medium-severity vulnerability identified in version 1.0 of the itsourcecode Online Tour and Travel Management System. The vulnerability resides in the /admin/operations/travellers.php file, specifically in the handling of the 'photo' argument. This flaw allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication. The vulnerability is characterized by the ability to upload arbitrary files, which can lead to remote code execution or server compromise if malicious files such as web shells are uploaded. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates that the attack can be launched over the network with low attack complexity and no user interaction, but requires low privileges (PR:L). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant compromise. Although no official patch or exploit in the wild has been reported yet, the exploit code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche software used in the tour and travel management sector.
Potential Impact
For European organizations, especially those in the travel and tourism industry using the itsourcecode Online Tour and Travel Management System, this vulnerability poses a tangible risk. Successful exploitation can lead to unauthorized access, data breaches involving traveler personal information, and potential disruption of business operations. Given the nature of the travel industry, which handles sensitive personal and payment data, exploitation could result in regulatory non-compliance with GDPR, financial penalties, and reputational damage. Additionally, attackers could leverage the unrestricted upload to deploy malware or ransomware, impacting availability and causing operational downtime. The medium severity rating suggests that while the vulnerability is not trivial, it requires some level of access, which may limit widespread exploitation but still represents a significant threat to affected entities.
Mitigation Recommendations
Organizations should immediately audit their use of the itsourcecode Online Tour and Travel Management System version 1.0 and assess exposure to the /admin/operations/travellers.php endpoint. Since no official patch is currently available, mitigation should focus on restricting access to the administrative interface through network segmentation, VPNs, or IP whitelisting to limit potential attackers. Implementing strict file upload controls such as validating file types, enforcing file size limits, and scanning uploaded files for malware can reduce risk. Monitoring web server logs for suspicious upload attempts and anomalous activity is critical. If possible, upgrading to a newer, patched version of the software or switching to alternative solutions should be prioritized once available. Additionally, applying web application firewalls (WAFs) with custom rules to detect and block malicious upload attempts can provide an additional layer of defense.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-9153: Unrestricted Upload in itsourcecode Online Tour and Travel Management System
Description
A vulnerability was detected in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/travellers.php. The manipulation of the argument photo results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9153 is a medium-severity vulnerability identified in version 1.0 of the itsourcecode Online Tour and Travel Management System. The vulnerability resides in the /admin/operations/travellers.php file, specifically in the handling of the 'photo' argument. This flaw allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication. The vulnerability is characterized by the ability to upload arbitrary files, which can lead to remote code execution or server compromise if malicious files such as web shells are uploaded. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates that the attack can be launched over the network with low attack complexity and no user interaction, but requires low privileges (PR:L). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant compromise. Although no official patch or exploit in the wild has been reported yet, the exploit code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche software used in the tour and travel management sector.
Potential Impact
For European organizations, especially those in the travel and tourism industry using the itsourcecode Online Tour and Travel Management System, this vulnerability poses a tangible risk. Successful exploitation can lead to unauthorized access, data breaches involving traveler personal information, and potential disruption of business operations. Given the nature of the travel industry, which handles sensitive personal and payment data, exploitation could result in regulatory non-compliance with GDPR, financial penalties, and reputational damage. Additionally, attackers could leverage the unrestricted upload to deploy malware or ransomware, impacting availability and causing operational downtime. The medium severity rating suggests that while the vulnerability is not trivial, it requires some level of access, which may limit widespread exploitation but still represents a significant threat to affected entities.
Mitigation Recommendations
Organizations should immediately audit their use of the itsourcecode Online Tour and Travel Management System version 1.0 and assess exposure to the /admin/operations/travellers.php endpoint. Since no official patch is currently available, mitigation should focus on restricting access to the administrative interface through network segmentation, VPNs, or IP whitelisting to limit potential attackers. Implementing strict file upload controls such as validating file types, enforcing file size limits, and scanning uploaded files for malware can reduce risk. Monitoring web server logs for suspicious upload attempts and anomalous activity is critical. If possible, upgrading to a newer, patched version of the software or switching to alternative solutions should be prioritized once available. Additionally, applying web application firewalls (WAFs) with custom rules to detect and block malicious upload attempts can provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T09:09:19.624Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a4c6efad5a09ad00fa2977
Added to database: 8/19/2025, 6:48:15 PM
Last enriched: 8/19/2025, 7:02:54 PM
Last updated: 8/19/2025, 7:32:50 PM
Views: 2
Related Threats
CVE-2025-9165: Memory Leak in LibTIFF
MediumCVE-2025-9157: Use After Free in appneta tcpreplay
MediumCVE-2025-51529: n/a
MediumCVE-2025-50579: n/a
MediumCVE-2025-55740: CWE-1392: Use of Default Credentials in Anipaleja nginx-defender
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.