CVE-2025-12223
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-27

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in Bdtask Flight Booking Software up to 3.1. This affects an unknown part of the file /b2c/package-information of the component Package Information Module. The manipulation results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-27
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-10-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bdtask flight_booking_software to 3.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-12223 is an unrestricted file upload vulnerability in Bdtask Flight Booking Software up to version 3.1, specifically in the Package Information Module at /b2c/package-information. It allows attackers, including remote unauthenticated ones, to upload files without proper validation of file type or content. This can enable attackers to upload malicious files such as executable scripts or web shells, potentially leading to remote code execution and compromising the system's confidentiality, integrity, and availability. [1, 3]


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized remote code execution on the affected server, allowing attackers to take control of the system. It compromises confidentiality, integrity, and availability by enabling attackers to upload malicious files that the system may automatically process. This can lead to data breaches, system downtime, and further exploitation of the network or infrastructure. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of unrestricted file upload attempts to the /b2c/package-information endpoint of Bdtask Flight Booking Software. Since the vulnerability allows uploading executable scripts (e.g., PHP web shells), monitoring HTTP requests for file uploads with suspicious extensions or content types is recommended. You can use network monitoring tools or web server logs to identify such uploads. For example, using grep on web server logs to find POST requests to /b2c/package-information: 1) grep 'POST /b2c/package-information' /var/log/apache2/access.log 2) grep -iE '\.(php|phtml|php5|php7|phar)$' /var/www/html/b2c/uploads/* 3) Use tools like curl to test upload functionality: curl -F '[email protected]' http://target/b2c/package-information 4) Use intrusion detection systems (IDS) with rules to detect file upload anomalies. Note that no official detection commands are provided, so these are general suggestions based on the vulnerability nature. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or restricting the file upload functionality in the /b2c/package-information module if possible. Since no official patches or vendor fixes exist, consider implementing strict validation on file uploads (e.g., restrict allowed file types and scan uploaded files for malicious content). Additionally, restrict access to the affected module to trusted users only, and monitor for suspicious activity. If feasible, replace the affected software with an alternative product that does not have this vulnerability. Applying web application firewalls (WAF) rules to block malicious upload attempts can also help mitigate risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart