CVE-2025-7517

Booking · Booking Multiple Products

A high-severity vulnerability has been identified in multiple Booking products, specifically impacting the Online Appointment Booking System.

Executive summary

A high-severity vulnerability has been identified in multiple Booking products, specifically impacting the Online Appointment Booking System. This flaw could allow an unauthenticated attacker to remotely access and manipulate sensitive database information. Successful exploitation could lead to a significant data breach of customer and appointment information, causing severe reputational damage and operational disruption.

Vulnerability

The vulnerability is a SQL injection flaw within the public-facing appointment booking interface. An unauthenticated remote attacker can exploit this by sending specially crafted SQL commands within the input fields of the booking form. Due to insufficient input validation, these commands are executed directly by the backend database, allowing the attacker to read, modify, or delete data, and potentially escalate their privileges or achieve remote code execution on the database server.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Although the vendor has classified it as "critical," its exploitation can lead to severe business consequences. An attacker could exfiltrate sensitive Personally Identifiable Information (PII) of customers, leading to major privacy violations and potential fines under regulations like GDPR. Furthermore, the ability to alter or delete appointment data could cripple core business operations, erode customer trust, and result in direct financial loss.

Remediation

Immediate Action: Apply the security updates provided by Booking to all affected systems immediately. Prioritize patching for publicly accessible instances of the Online Appointment Booking System. After patching, review web server and application access logs for any signs of attempted or successful exploitation predating the patch.

Proactive Monitoring: Implement enhanced monitoring of application and database logs. Specifically, search for suspicious SQL syntax in web request logs (e.g., UNION SELECT, '--, SLEEP()), a high volume of errors from booking-related endpoints, or anomalous queries originating from the web application server to the database. Monitor for unusual outbound network traffic from the database server, which could indicate data exfiltration.

Compensating Controls: If patching cannot be performed immediately, deploy or update a Web Application Firewall (WAF) with rules specifically designed to detect and block SQL injection attacks against the vulnerable application parameters. Restrict access to the application's management interfaces to only trusted IP addresses and consider temporarily disabling the public booking feature if the risk is deemed unacceptable.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Immediate action is required to address this high-severity vulnerability. The primary recommendation is to apply the vendor-supplied security patch across all affected systems without delay. Although this CVE is not currently listed on the CISA KEV catalog, its potential for a significant data breach means it is a prime candidate for future inclusion if widespread exploitation occurs. Organizations should treat this as an urgent threat and implement compensating controls, such as WAF rules, to provide a layered defense while the patching process is underway.