CVE-2025-57642
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-10

Last updated on: 2025-10-17

Assigner: MITRE

Description
A Shell Upload vulnerability in Tourism Management System 2.0 allows an attacker to upload and execute arbitrary PHP shell scripts on the server, leading to remote code execution and unauthorized access to the system. This can result in the compromise of sensitive data and system functionality.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-10
Last Modified
2025-10-17
Generated
2026-05-07
AI Q&A
2025-09-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sohamjuhin tourism_management_system 2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Unrestricted File Upload flaw in Tourism Management System 2.0, specifically in the Admin Panel during the 'Create Tour Package' process. An attacker can upload arbitrary files, including malicious PHP shell scripts disguised as images. Once uploaded, these PHP scripts can be executed on the server, allowing the attacker to run server-side code, gain unauthorized access, and control the system. [1]


How can this vulnerability impact me? :

The vulnerability can lead to remote code execution and unauthorized access to the system. This means an attacker can compromise sensitive data and system functionality, potentially taking control of the server and accessing or manipulating confidential information. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to upload a PHP file disguised as an image to the endpoint `/admin/change-image.php?imgid=3` using a crafted POST request with multipart/form-data. For example, using curl: `curl -v -F '[email protected]' http://<target>/admin/change-image.php?imgid=3`. If the server accepts and executes the PHP file, the vulnerability exists. Additionally, monitoring web server logs for suspicious POST requests to this endpoint or unexpected PHP file uploads can help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or restricting file uploads in the Admin Panel, especially for the 'Create Tour Package' feature. Implement strict server-side validation to allow only legitimate image file types and reject any PHP or executable files. Applying patches or updates from the vendor, if available, is recommended. Additionally, restricting access to the upload endpoint and monitoring for suspicious activity can help reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart