---
title: "SpiceJet Booking System Flaws Expose Passenger Data: Critical Vulnerabilities Unpatched"
short_title: "SpiceJet booking system flaws expose passenger data"
description: "Two high-severity vulnerabilities in SpiceJet's online booking system (CVE-2026-6375, CVE-2026-6376) allow unauthorized access to passenger data. Learn mitigation steps now."
author: "Vitus"
date: 2024-10-02
categories: [Cybersecurity, Vulnerabilities]
tags: [spicejet, cve-2026-6375, cve-2026-6376, data-breach, transportation-security]
score: 0.85
cve_ids: [CVE-2026-6375, CVE-2026-6376]
---
## TL;DR
Two critical vulnerabilities in SpiceJet’s online booking system (CVE-2026-6375 and CVE-2026-6376) expose passenger data to unauthorized access. Attackers can exploit these flaws to retrieve sensitive information, including passenger names and booking details, without authentication. Despite CISA’s efforts to coordinate with SpiceJet, no patches have been released, leaving millions of travelers at risk.
Main Content
### Introduction
The SpiceJet online booking system, a critical component of India’s aviation infrastructure, has been found to contain two high-severity vulnerabilities that could allow attackers to access sensitive passenger data. These flaws, identified as CVE-2026-6375 and CVE-2026-6376, stem from missing authentication and authorization controls in the system’s API and booking retrieval page. With a CVSS score of 7.5, these vulnerabilities pose a significant risk to passenger privacy and operational security.
### Key Points
- Unauthenticated access: Attackers can query passenger name records (PNRs) and retrieve booking details without any authentication.
- Predictable identifiers: PNRs follow a predictable pattern, enabling attackers to systematically enumerate and extract passenger data.
- Global impact: The vulnerabilities affect SpiceJet’s booking system worldwide, exposing travelers across all deployed regions.
- No official patch: SpiceJet has not responded to CISA’s coordination efforts, leaving users vulnerable.
- High-severity risks: Both vulnerabilities are rated 7.5 (High) on the CVSS scale, indicating a severe threat to data confidentiality.
Technical Details
#### CVE-2026-6375: Authorization Bypass Through User-Controlled Key
This vulnerability allows unauthenticated users to access passenger name records (PNRs) via SpiceJet’s booking API. The flaw arises from missing authorization checks on an endpoint intended for authenticated profile access. Because PNR identifiers are predictable, attackers can brute-force or enumerate valid records and retrieve associated passenger names.
- Relevant CWE: CWE-639: Authorization Bypass Through User-Controlled Key
- CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - Base Score: 7.5 (High)
#### CVE-2026-6376: Missing Authentication for Critical Function
This flaw permits full passenger booking details to be accessed using only a PNR and last name, with no authentication or verification mechanisms. The issue stems from improper access controls on a sensitive data retrieval function, exposing personal, travel, and booking metadata to any unauthenticated user.
- Relevant CWE: CWE-306: Missing Authentication for Critical Function
- CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N - Base Score: 7.5 (High)
### Impact Assessment
The exploitation of these vulnerabilities could have far-reaching consequences:
- Passenger Privacy Violations: Attackers can access sensitive personal data, including names, travel itineraries, and booking details, leading to potential identity theft or fraud.
- Operational Disruptions: Unauthorized access to booking systems could disrupt airline operations, causing delays or financial losses.
- Reputational Damage: SpiceJet may face loss of customer trust and regulatory scrutiny due to inadequate security measures.
- Global Risk: As SpiceJet operates worldwide, the vulnerabilities expose travelers across multiple countries to potential data breaches.
### Mitigation Steps
While SpiceJet has not released an official patch, CISA recommends the following defensive measures to minimize risk:
1. Network Segmentation:
- Isolate booking systems and control system networks from business networks.
- Ensure critical systems are not accessible from the internet.
2. Secure Remote Access:
- Use Virtual Private Networks (VPNs) for remote access, ensuring they are updated to the latest version.
- Recognize that VPNs are only as secure as the connected devices.
3. Monitor for Malicious Activity:
- Implement intrusion detection systems to identify and respond to suspicious activity.
- Follow established internal procedures to report and mitigate incidents.
4. User Awareness:
- Educate employees and customers about social engineering attacks, such as phishing and unsolicited emails.
- Refer to CISA’s guidelines on Recognizing and Avoiding Email Scams and Avoiding Social Engineering Attacks.
5. Contact SpiceJet:
- Users are encouraged to reach out to SpiceJet for updates or mitigation guidance via their contact page.
### Affected Systems
- Vendor: SpiceJet
- Product: SpiceJet Online Booking System
- Versions Affected: All versions (vers:all/*)
- Status: Known to be affected; no patch available
## Conclusion
The unpatched vulnerabilities in SpiceJet’s online booking system highlight the critical need for robust authentication and authorization controls in aviation and transportation sectors. With no official response from SpiceJet, travelers and organizations must take proactive steps to mitigate risks and protect sensitive data. CISA’s recommendations provide a starting point, but immediate action is required to prevent potential exploitation.
As the situation evolves, stakeholders should monitor updates from CISA and SpiceJet for patches or additional guidance. The lack of response from SpiceJet underscores the importance of vendor accountability in addressing cybersecurity threats.
## References
[^1]: CISA. "ICS Advisory (ICSA-26-113-04): SpiceJet Online Booking System Vulnerabilities". Retrieved 2024-10-02.
[^2]: MITRE. "CWE-639: Authorization Bypass Through User-Controlled Key". Retrieved 2024-10-02.
[^3]: MITRE. "CWE-306: Missing Authentication for Critical Function". Retrieved 2024-10-02.
[^4]: SpiceJet. "Corporate Contact Page". Retrieved 2024-10-02.