Source: hoteldruid
Version: 3.0.6-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for hoteldruid.

CVE-2025-25747[0]:
| Cross Site Scripting vulnerability in DigitalDruid HotelDruid
| v.3.0.7 allows an attacker to execute arbitrary code and obtain
| sensitive information via the ripristina_backup parameter in the
| crea_backup.php endpoint


CVE-2025-25748[1]:
| A CSRF vulnerability in the gestione_utenti.php endpoint of
| HotelDruid 3.0.7 allows attackers to perform unauthorized actions
| (e.g., modifying user passwords) on behalf of authenticated users by
| exploiting the lack of origin or referrer validation and the absence
| of CSRF tokens. NOTE: this is disputed because there is an
| id_sessione CSRF token.


CVE-2025-25749[2]:
| An issue in HotelDruid version 3.0.7 and earlier allows users to set
| weak passwords due to the lack of enforcement of password strength
| policies.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-25747
    https://www.cve.org/CVERecord?id=CVE-2025-25747
[1] https://security-tracker.debian.org/tracker/CVE-2025-25748
    https://www.cve.org/CVERecord?id=CVE-2025-25748
[2] https://security-tracker.debian.org/tracker/CVE-2025-25749
    https://www.cve.org/CVERecord?id=CVE-2025-25749

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to