CVE-2025-11353
📋 TL;DR
This vulnerability allows remote attackers to upload arbitrary files to the Online Hotel Reservation System 1.0 via the /admin/addgalleryexec.php endpoint. Attackers can potentially execute malicious code on the server or compromise system integrity. All users running the vulnerable version of this hotel reservation software are affected.
💻 Affected Systems
- code-projects Online Hotel Reservation System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, and server takeover
Likely Case
Malicious file upload enabling web shell deployment, data manipulation, or denial of service
If Mitigated
Limited impact with proper file upload restrictions and input validation in place
🎯 Exploit Status
Exploit requires admin access to reach the vulnerable endpoint, but the upload mechanism itself has no restrictions
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider implementing workarounds or replacing the software.
🔧 Temporary Workarounds
Restrict file uploads
allImplement strict file type validation and size limits for uploads
Remove vulnerable file
linuxDelete or rename /admin/addgalleryexec.php if not needed
rm /path/to/admin/addgalleryexec.php
🧯 If You Can't Patch
- Implement web application firewall rules to block malicious upload patterns
- Restrict access to admin panel to trusted IP addresses only
🔍 How to Verify
Check if Vulnerable:
Check if /admin/addgalleryexec.php exists and allows unrestricted file uploads
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Test file upload functionality with various file types to ensure restrictions are in place
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /admin/addgalleryexec.php
- Suspicious file types being uploaded
Network Indicators:
- POST requests to /admin/addgalleryexec.php with file uploads
SIEM Query:
source="web_logs" AND uri="/admin/addgalleryexec.php" AND method="POST" AND file_upload="true"