CVE-2025-57642
BaseFortify
Publication date: 2025-09-10
Last updated on: 2025-10-17
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sohamjuhin | tourism_management_system | 2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Unrestricted File Upload flaw in Tourism Management System 2.0, specifically in the Admin Panel during the 'Create Tour Package' process. An attacker can upload arbitrary files, including malicious PHP shell scripts disguised as images. Once uploaded, these PHP scripts can be executed on the server, allowing the attacker to run server-side code, gain unauthorized access, and control the system. [1]
How can this vulnerability impact me? :
The vulnerability can lead to remote code execution and unauthorized access to the system. This means an attacker can compromise sensitive data and system functionality, potentially taking control of the server and accessing or manipulating confidential information. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to upload a PHP file disguised as an image to the endpoint `/admin/change-image.php?imgid=3` using a crafted POST request with multipart/form-data. For example, using curl: `curl -v -F '[email protected]' http://<target>/admin/change-image.php?imgid=3`. If the server accepts and executes the PHP file, the vulnerability exists. Additionally, monitoring web server logs for suspicious POST requests to this endpoint or unexpected PHP file uploads can help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling or restricting file uploads in the Admin Panel, especially for the 'Create Tour Package' feature. Implement strict server-side validation to allow only legitimate image file types and reject any PHP or executable files. Applying patches or updates from the vendor, if available, is recommended. Additionally, restricting access to the upload endpoint and monitoring for suspicious activity can help reduce risk. [1]