CVE Alert: CVE-2025-9926 – projectworlds – Travel Management System

CVE-2025-9926

HIGHNo exploitation knownPoC observed

A vulnerability was determined in projectworlds Travel Management System 1.0. Impacted is an unknown function of the file /viewsubcategory.php. This manipulation of the argument t1 causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
projectworlds
Product
Travel Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-03T20:02:06.607Z
Updated
2025-09-03T20:13:38.964Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with publicly available PoC makes exploitation feasible; urgent remediation advised.

Why this matters

An attacker can potentially exfiltrate or modify data via the vulnerable t1 parameter, risking customer data and system integrity. For a travel management system, this could enable fraud, credential access, or operational disruption, with quick real-world impact if left unmitigated.

Most likely attack path

Remote attacker targets /viewsubcategory.php with crafted t1 values to trigger an unparameterized SQL query. No user interaction or credentials are required, increasing the likelihood of automated probing and data leakage; lateral movement is possible if the database layer is exposed and poorly isolated within the app stack.

Who is most exposed

Public-facing deployments of the Travel Management System (especially in small to mid-size organisations) on PHP stacks are at risk, particularly where the web server/database are in the DMZ or have weak input validation and insufficient DB permissions.

Detection ideas

  • Unusual query strings or error messages in web/app logs referencing t1 values.
  • Sudden spikes in SQL error codes or database error logs.
  • Anomalous data access patterns: large data dumps or repeated SELECTs from subcategory tables.
  • WAF alerts triggered by SQLi-like payloads (e.g., tautologies, union-based payloads).
  • IDS/IPS signatures for known SQLi patterns targeting PHP apps.

Mitigation and prioritisation

  • Patch or upgrade to vendor-fixed version; implement parameterised queries immediately.
  • Enforce strict input validation and bound parameters for all user-supplied data; disable dynamic query construction.
  • Apply web application firewall rules tuned for SQL injection; restrict network access to the database.
  • Review and tighten DB service account privileges; employ least privilege and separate web/app DB users.
  • Change-management: prioritise patching within a fixed window; monitor for exploitation indicators and perform post-patch validation. If a fix is not yet available, implement compensating controls and temporary controls with continuous monitoring.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.