Skip to main content

CVE-2025-9153: Unrestricted Upload in itsourcecode Online Tour and Travel Management System

Medium
VulnerabilityCVE-2025-9153cvecve-2025-9153
Published: Tue Aug 19 2025 (08/19/2025, 18:32:08 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Online Tour and Travel Management System

Description

A vulnerability was detected in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/travellers.php. The manipulation of the argument photo results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 08/19/2025, 19:02:54 UTC

Technical Analysis

CVE-2025-9153 is a medium-severity vulnerability identified in version 1.0 of the itsourcecode Online Tour and Travel Management System. The vulnerability resides in the /admin/operations/travellers.php file, specifically in the handling of the 'photo' argument. This flaw allows an attacker to perform an unrestricted file upload remotely without requiring user interaction or authentication. The vulnerability is characterized by the ability to upload arbitrary files, which can lead to remote code execution or server compromise if malicious files such as web shells are uploaded. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates that the attack can be launched over the network with low attack complexity and no user interaction, but requires low privileges (PR:L). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant compromise. Although no official patch or exploit in the wild has been reported yet, the exploit code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche software used in the tour and travel management sector.

Potential Impact

For European organizations, especially those in the travel and tourism industry using the itsourcecode Online Tour and Travel Management System, this vulnerability poses a tangible risk. Successful exploitation can lead to unauthorized access, data breaches involving traveler personal information, and potential disruption of business operations. Given the nature of the travel industry, which handles sensitive personal and payment data, exploitation could result in regulatory non-compliance with GDPR, financial penalties, and reputational damage. Additionally, attackers could leverage the unrestricted upload to deploy malware or ransomware, impacting availability and causing operational downtime. The medium severity rating suggests that while the vulnerability is not trivial, it requires some level of access, which may limit widespread exploitation but still represents a significant threat to affected entities.

Mitigation Recommendations

Organizations should immediately audit their use of the itsourcecode Online Tour and Travel Management System version 1.0 and assess exposure to the /admin/operations/travellers.php endpoint. Since no official patch is currently available, mitigation should focus on restricting access to the administrative interface through network segmentation, VPNs, or IP whitelisting to limit potential attackers. Implementing strict file upload controls such as validating file types, enforcing file size limits, and scanning uploaded files for malware can reduce risk. Monitoring web server logs for suspicious upload attempts and anomalous activity is critical. If possible, upgrading to a newer, patched version of the software or switching to alternative solutions should be prioritized once available. Additionally, applying web application firewalls (WAFs) with custom rules to detect and block malicious upload attempts can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-19T09:09:19.624Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a4c6efad5a09ad00fa2977

Added to database: 8/19/2025, 6:48:15 PM

Last enriched: 8/19/2025, 7:02:54 PM

Last updated: 8/19/2025, 7:32:50 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats