CVE-2025-11470
📋 TL;DR
This vulnerability allows attackers to upload arbitrary files to the Hotel and Lodge Management System through the /manage_website.php endpoint. Attackers can exploit this remotely to upload malicious files like web shells. All users running SourceCodester Hotel and Lodge Management System version 1.0 or earlier are affected.
💻 Affected Systems
- SourceCodester Hotel and Lodge Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via web shell leading to data theft, ransomware deployment, or lateral movement within the network.
Likely Case
Unauthorized file upload leading to defacement, data exfiltration, or limited server compromise.
If Mitigated
File upload attempts are blocked or logged, preventing successful exploitation.
🎯 Exploit Status
Exploit details are publicly available on GitHub. Attack requires access to the management interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 1.0 (check vendor for specific version)
Vendor Advisory: https://www.sourcecodester.com/
Restart Required: No
Instructions:
1. Check SourceCodester website for updated version. 2. Backup current installation. 3. Replace vulnerable files with patched version. 4. Verify file upload functionality is properly restricted.
🔧 Temporary Workarounds
Restrict File Upload Types
allImplement server-side validation to only allow specific image file types (jpg, png, gif) and check file signatures.
Web Application Firewall Rules
allDeploy WAF rules to block requests to /manage_website.php with suspicious file upload parameters.
🧯 If You Can't Patch
- Remove or restrict access to /manage_website.php endpoint via web server configuration
- Implement strict file upload validation and store uploaded files outside web root
🔍 How to Verify
Check if Vulnerable:
Attempt to upload a non-image file (like .php) to /manage_website.php via website_image or back_login_image parameters.
Check Version:
Check system version in admin panel or review source code for version markers.
Verify Fix Applied:
Test that only allowed file types can be uploaded and uploaded files cannot be executed as code.
📡 Detection & Monitoring
Log Indicators:
- Multiple failed upload attempts
- Uploads of non-image file types
- Requests to /manage_website.php with unusual parameters
Network Indicators:
- POST requests to /manage_website.php with file upload content
- Subsequent requests to uploaded files with suspicious extensions
SIEM Query:
source="web_server" AND (uri="/manage_website.php" AND method="POST" AND (file_extension!="jpg" OR file_extension!="png" OR file_extension!="gif"))