A Shell Upload vulnerability in Tourism Management System 2.0 allows an attacker to upload and execute arbitrary PHP shell scripts on the server, leading to remote code execution and unauthorized access to the system. This can result in the compromise of sensitive data and system functionality.
References
Link | Resource |
---|---|
https://github.com/debug-security/CVE/tree/main/CVE-2025-57642 | Exploit Third Party Advisory |
https://github.com/sohamjuhin/Tourism-Management-System/issues/2 | Exploit Issue Tracking |
Configurations
History
17 Oct 2025, 19:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/debug-security/CVE/tree/main/CVE-2025-57642 - Exploit, Third Party Advisory | |
References | () https://github.com/sohamjuhin/Tourism-Management-System/issues/2 - Exploit, Issue Tracking | |
First Time |
Sohamjuhin
Sohamjuhin tourism Management System |
|
CPE | cpe:2.3:a:sohamjuhin:tourism_management_system:2.0:*:*:*:*:*:*:* |
22 Sep 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CWE | CWE-434 |
10 Sep 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-10 17:15
Updated : 2025-10-17 19:28
NVD link : CVE-2025-57642
Mitre link : CVE-2025-57642
CVE.ORG link : CVE-2025-57642
JSON object : View
Products Affected
sohamjuhin
- tourism_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type