CVE-2025-11398

6.3 MEDIUM

📋 TL;DR

SourceCodester Hotel and Lodge Management System 1.0 has an unrestricted file upload vulnerability in the profile.php image upload function. Attackers can remotely upload malicious files, potentially leading to server compromise. All deployments of version 1.0 are affected.

💻 Affected Systems

Products:
  • SourceCodester Hotel and Lodge Management System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data theft, and lateral movement within the network.

🟠

Likely Case

Webshell upload allowing persistent backdoor access, data exfiltration, and further exploitation of the server.

🟢

If Mitigated

File upload blocked or sanitized, preventing malicious file execution while maintaining legitimate functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires authentication to access profile.php.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.sourcecodester.com/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Implement File Upload Restrictions

all

Add server-side validation to restrict file uploads to specific extensions and scan for malicious content.

Modify profile.php to include: $allowed_extensions = ['jpg', 'jpeg', 'png', 'gif']; $max_size = 2097152; // 2MB

Disable Profile Image Upload

all

Temporarily disable the image upload functionality in profile.php until a proper fix is available.

Comment out or remove file upload code in profile.php

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file uploads
  • Restrict network access to the application using firewall rules

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a file with a malicious extension (e.g., .php) through the profile image upload feature.

Check Version:

Check the software version in the admin panel or application footer.

Verify Fix Applied:

Test that only allowed file types (images) can be uploaded and that uploaded files cannot be executed as code.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /profile.php
  • Uploads of non-image file types
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to /profile.php with file uploads
  • Unusual outbound connections after file upload

SIEM Query:

source="web_server" AND uri="/profile.php" AND method="POST" AND (file_extension!="jpg" OR file_extension!="jpeg" OR file_extension!="png" OR file_extension!="gif")

🔗 References

📤 Share & Export