CVE-2025-11470

4.7 MEDIUM

📋 TL;DR

This vulnerability allows attackers to upload arbitrary files to the Hotel and Lodge Management System through the /manage_website.php endpoint. Attackers can exploit this remotely to upload malicious files like web shells. All users running SourceCodester Hotel and Lodge Management System version 1.0 or earlier are affected.

💻 Affected Systems

Products:
  • SourceCodester Hotel and Lodge Management System
Versions: Up to and including version 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configuration are vulnerable. Requires web server with PHP support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via web shell leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Unauthorized file upload leading to defacement, data exfiltration, or limited server compromise.

🟢

If Mitigated

File upload attempts are blocked or logged, preventing successful exploitation.

🌐 Internet-Facing: HIGH - Attackers can exploit remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if system is accessible internally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires access to the management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.0 (check vendor for specific version)

Vendor Advisory: https://www.sourcecodester.com/

Restart Required: No

Instructions:

1. Check SourceCodester website for updated version. 2. Backup current installation. 3. Replace vulnerable files with patched version. 4. Verify file upload functionality is properly restricted.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Implement server-side validation to only allow specific image file types (jpg, png, gif) and check file signatures.

Web Application Firewall Rules

all

Deploy WAF rules to block requests to /manage_website.php with suspicious file upload parameters.

🧯 If You Can't Patch

  • Remove or restrict access to /manage_website.php endpoint via web server configuration
  • Implement strict file upload validation and store uploaded files outside web root

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a non-image file (like .php) to /manage_website.php via website_image or back_login_image parameters.

Check Version:

Check system version in admin panel or review source code for version markers.

Verify Fix Applied:

Test that only allowed file types can be uploaded and uploaded files cannot be executed as code.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed upload attempts
  • Uploads of non-image file types
  • Requests to /manage_website.php with unusual parameters

Network Indicators:

  • POST requests to /manage_website.php with file upload content
  • Subsequent requests to uploaded files with suspicious extensions

SIEM Query:

source="web_server" AND (uri="/manage_website.php" AND method="POST" AND (file_extension!="jpg" OR file_extension!="png" OR file_extension!="gif"))

🔗 References

📤 Share & Export