Skip to main content

CVE-2025-9155: SQL Injection in itsourcecode Online Tour and Travel Management System

Medium
VulnerabilityCVE-2025-9155cvecve-2025-9155
Published: Tue Aug 19 2025 (08/19/2025, 19:32:07 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Online Tour and Travel Management System

Description

A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1.0. Impacted is an unknown function of the file /user/forget_password.php. Such manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/19/2025, 20:02:58 UTC

Technical Analysis

CVE-2025-9155 is a SQL Injection vulnerability identified in version 1.0 of the itsourcecode Online Tour and Travel Management System. The vulnerability exists in the /user/forget_password.php script, specifically in the handling of the 'email' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows an unauthenticated remote attacker to potentially access, modify, or delete sensitive data within the database. The vulnerability does not require any user interaction or privileges, making it remotely exploitable over the network. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation (no authentication, no user interaction) but limited scope and impact on confidentiality, integrity, and availability (each rated low). The vulnerability has been publicly disclosed, but no known exploits are currently observed in the wild. The affected product is a niche online tour and travel management system, which may be used by small to medium travel agencies to manage bookings, user accounts, and related data. The lack of a patch link indicates that a fix may not yet be available, increasing the risk for organizations still running this version.

Potential Impact

For European organizations, particularly small and medium-sized travel agencies using the itsourcecode Online Tour and Travel Management System 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to customer data, including personal identifiable information (PII) such as email addresses, booking details, and potentially payment information if stored in the database. This compromises confidentiality and may result in data breaches subject to GDPR penalties. Additionally, attackers could alter or delete booking records, impacting data integrity and availability of services, leading to operational disruptions and reputational damage. Given the travel industry's importance in Europe and the sensitivity of customer data, exploitation could have legal and financial consequences. However, the limited market penetration of this specific software and the medium severity rating somewhat constrain the overall impact.

Mitigation Recommendations

Organizations using the itsourcecode Online Tour and Travel Management System 1.0 should immediately audit their systems for this vulnerability. Specific mitigations include: 1) Applying any available patches or updates from the vendor as soon as they are released. 2) If patches are not yet available, implement web application firewall (WAF) rules to detect and block SQL injection patterns targeting the 'email' parameter in /user/forget_password.php. 3) Conduct input validation and sanitization on all user-supplied data, especially the 'email' field, to prevent injection attacks. 4) Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 5) Monitor logs for suspicious activities related to password reset requests and unusual database queries. 6) Consider isolating or replacing the vulnerable system if it cannot be secured promptly. 7) Educate staff about the risks and ensure incident response plans are updated to handle potential data breaches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-19T09:09:24.813Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a4d4e5ad5a09ad00fa9731

Added to database: 8/19/2025, 7:47:49 PM

Last enriched: 8/19/2025, 8:02:58 PM

Last updated: 8/19/2025, 8:03:02 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats