Description
A vulnerability was determined in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /admin/mod_amenities/index.php?view=add. This manipulation of the argument image causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-26
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Unrestricted File Upload
Action: Patch
AI Analysis

Impact

The vulnerability exists in version 1.0 of itsourcecode's Free Hotel Reservation System and is triggered by manipulating the 'image' argument in the /admin/mod_amenities/index.php?view=add endpoint. The flaw permits an attacker to upload arbitrary files without any restriction on file type or size, enabling unrestricted file upload. This weakness is classified as improper access control (CWE‑284) and a file upload vulnerability (CWE‑434).

Affected Systems

Affected systems are servers running the itsourcecode Free Hotel Reservation System 1.0. The issue is located specifically in the admin/mod_amenities/index.php file when the view parameter is set to 'add', and it involves an unspecified function that validates or processes the image upload.

Risk and Exploitability

The CVSS base score for this vulnerability is 5.1, indicating a medium impact. No EPSS score is available, and the issue is not listed in the CISA KEV catalog. The attack can be performed remotely and is publicly disclosed, meaning that a remote attacker can craft a request to upload a file that bypasses the application's normal restrictions. Because the upload is unrestricted, a malicious file could be stored and later accessed through the web interface, potentially compromising the integrity of stored data or providing a vector for further exploitation, although the description does not specify further effects.

Generated by OpenCVE AI on March 26, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any available patch or newer release from itsourcecode.
  • Restrict the accepted file types for the image upload to only image formats and reject all other extensions.
  • Configure the upload directory to be non-executable to prevent execution of uploaded files.
  • Enable logging of upload attempts and monitor logs for unusual activity.
  • Consider implementing a Web Application Firewall rule that blocks unexpected file uploads.

Generated by OpenCVE AI on March 26, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /admin/mod_amenities/index.php?view=add. This manipulation of the argument image causes unrestricted upload. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Title itsourcecode Free Hotel Reservation System index.php unrestricted upload
First Time appeared Itsourcecode
Itsourcecode free Hotel Reservation System
Weaknesses CWE-284
CWE-434
CPEs cpe:2.3:a:itsourcecode:free_hotel_reservation_system:*:*:*:*:*:*:*:*
Vendors & Products Itsourcecode
Itsourcecode free Hotel Reservation System
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Free Hotel Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T12:23:31.296Z

Reserved: 2026-03-26T06:09:30.524Z

Link: CVE-2026-4875

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-26T13:16:30.563

Modified: 2026-03-26T13:16:30.563

Link: CVE-2026-4875

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:35:58Z

Weaknesses