# Exploit Title: Tourism Management System 2.0 - Arbitrary Shell Upload # Date: 2025-10-09 # Exploit Author: Debug Security # Vendor Homepage: https://kodcloud.com/ # Software Link: https://github.com/sohamjuhin/Tourism-Management-System # Version: v2.0 # Tested on: Windows 11, PHP 8.2.4, Apache 2.4.56 # CVE: CVE-2025-57642 # Reference: https://github.com/debug-security/CVE/tree/main/CVE-2025-57642 *Description:*A Shell Upload vulnerability in Tourism Management System 2.0 could allow an attacker to upload and execute malicious shell scripts on the server. This can lead to unauthorized access or control over the system, compromising sensitive data and functionality. *Version: *2.0 *Steps to Reproduce:* 1. At first visit this url http://target.com/index.php?user/login&link=. 2. Then use any malicious url in link parameter. 3. your link will be look like: http://target.com/index.php?user/login&link=https://{site}.com 4. login your account and you will redirect to malicious url.