CVE-2026-3800

A vulnerability has been found in SourceCodester/janobe Resort Reservation System 1.0. Affected is the function doInsert of the file /controller.php?action=add. Such manipulation of the argument image leads to unrestricted upload. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Resort-Reservation-System---Unrestricted-Upload.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.349767 Permissions Required VDB Entry
https://vuldb.com/?id.349767 Third Party Advisory VDB Entry
https://vuldb.com/?submit.768978 Third Party Advisory VDB Entry
https://vuldb.com/?submit.768998 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:oretnom23:resort_reservation_system:1.0:*:*:*:*:*:*:*

History

09 Mar 2026, 15:03

Type Values Removed Values Added
CPE cpe:2.3:a:oretnom23:resort_reservation_system:1.0:*:*:*:*:*:*:*
First Time Oretnom23 resort Reservation System
Oretnom23
References () https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Resort-Reservation-System---Unrestricted-Upload.md - () https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Resort-Reservation-System---Unrestricted-Upload.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.349767 - () https://vuldb.com/?ctiid.349767 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349767 - () https://vuldb.com/?id.349767 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.768978 - () https://vuldb.com/?submit.768978 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.768998 - () https://vuldb.com/?submit.768998 - Third Party Advisory, VDB Entry
Summary
  • (es) Una vulnerabilidad ha sido encontrada en SourceCodester/janobe Resort Reservation System 1.0. Afectada es la función doInsert del archivo /controller.PHP?action=add. Dicha manipulación del argumento image lleva a una carga sin restricciones. El ataque puede ser ejecutado remotamente. El exploit ha sido divulgado al público y puede ser usado.

09 Mar 2026, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-09 04:16

Updated : 2026-03-09 15:03


NVD link : CVE-2026-3800

Mitre link : CVE-2026-3800

CVE.ORG link : CVE-2026-3800


JSON object : View

Products Affected

oretnom23

  • resort_reservation_system
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type