CVE-2025-11103
BaseFortify
Publication date: 2025-09-28
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| projectworlds | online_tours_and_travels | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11103 is a critical file upload vulnerability in the Online Tours and Travels Project version 1.0, specifically in the admin/change-image.php file. The vulnerability occurs because the application does not properly validate files uploaded via the packageimage argument, allowing attackers to upload arbitrary and potentially malicious files such as web shells. This can lead to remote code execution, enabling attackers to execute commands on the server, modify or delete files, and potentially gain full control over the system. Exploitation requires an authenticated administrator session but can be initiated remotely. [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized remote code execution, full system compromise, data theft, modification or deletion of files, and potential disruption of services. Attackers can upload malicious files disguised as images, execute system commands remotely, and gain unauthorized access to sensitive information or control over the affected system. This compromises the confidentiality, integrity, and availability of the system. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the vulnerable endpoint /admin/change-image.php and monitoring for suspicious file upload activity targeting the 'packageimage' parameter. A useful method is to use Google dorking with the query 'inurl:admin/change-image.php' to identify potentially vulnerable targets. Additionally, monitoring HTTP POST requests to /admin/change-image.php with multipart/form-data containing suspicious file types (e.g., PHP files disguised as images) can help detect exploitation attempts. Commands such as using curl or wget to test file upload functionality or inspecting web server logs for POST requests to this endpoint with unusual file extensions can be helpful. For example, a curl command to test upload might be: curl -v -F "[email protected]" -F "submit=Upload" http://target/admin/change-image.php. Also, reviewing authentication logs for admin/admin default credential usage may indicate exploitation attempts. [3, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include implementing strict server-side validation of uploaded files by enforcing a whitelist of allowed file extensions and MIME types, validating the actual content of uploaded files to prevent spoofing, and renaming uploaded files with randomized filenames to prevent direct access. Additionally, store uploaded files outside the web root and serve them via secure scripts to control access. Limit the file size to prevent denial-of-service attacks and apply secure file permissions to prevent execution unless explicitly intended. It is also critical to change default administrator credentials to prevent unauthorized access. If possible, replace the affected component with an alternative product. These measures help prevent attackers from uploading malicious files and executing remote code. [2, 1]