Executive Summary
In April 2026, two critical vulnerabilities were identified in SpiceJet's Online Booking System: CVE-2026-6375 and CVE-2026-6376. These flaws allowed unauthenticated users to access passenger name records (PNRs) and full booking details using only a PNR and last name, due to missing authorization checks and authentication mechanisms. This exposed sensitive personal and travel information to potential exploitation. (securityvulnerability.io)
The incident underscores the importance of robust access controls in online systems, especially in the transportation sector. Organizations must prioritize securing sensitive customer data to prevent unauthorized access and potential misuse.
Why This Matters Now
The vulnerabilities in SpiceJet's Online Booking System highlight the critical need for stringent access controls in online platforms, particularly within the transportation industry. Ensuring the security of sensitive customer data is paramount to prevent unauthorized access and potential misuse.
Attack Path Analysis
An attacker exploited missing authentication and authorization controls in SpiceJet's booking API to access passenger name records (PNRs) without credentials. By systematically querying the API, the attacker enumerated valid PNRs and associated passenger names. With access to sensitive passenger information, the attacker could have escalated privileges by leveraging exposed data to impersonate users or gain further access. The attacker may have moved laterally within the system to access additional data or systems. Establishing command and control channels, the attacker could have maintained persistent access to the compromised systems. The attacker exfiltrated sensitive passenger data, potentially leading to privacy violations and regulatory penalties. The impact included reputational damage to SpiceJet and potential legal consequences due to the data breach.
Kill Chain Progression
Initial Compromise
Description
An attacker exploited missing authentication and authorization controls in SpiceJet's booking API to access passenger name records (PNRs) without credentials.
Related CVEs
CVE-2026-6375
CVSS 8.7A vulnerability in SpiceJet's booking API allows unauthenticated users to query passenger name records (PNRs) without any access controls, potentially leading to unauthorized disclosure of sensitive passenger information.
Affected Products:
SpiceJet SpiceJet Online Booking System – all
Exploit Status:
no public exploitCVE-2026-6376
CVSS 8.7A weakness in SpiceJet's public booking retrieval page permits full passenger booking details to be accessed using only a PNR and last name, with no authentication or verification mechanisms, leading to potential exposure of extensive personal, travel, and booking metadata.
Affected Products:
SpiceJet SpiceJet Online Booking System – all
Exploit Status:
no public exploit
MITRE ATT&CK® Techniques
Modify Authentication Process
Exploitation for Credential Access
Valid Accounts
Account Discovery
Steal Web Session Cookie
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure that all system components are protected from known vulnerabilities by installing applicable security patches.
Control ID: 6.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Implement strong authentication mechanisms
Control ID: Identity
NIS2 Directive – Cybersecurity risk-management measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Airlines/Aviation
SpiceJet booking system vulnerabilities expose passenger PNR data through authentication bypass, creating massive privacy breaches and regulatory compliance violations for aviation sector.
Information Technology/IT
Application security vulnerabilities in booking APIs demonstrate critical authentication flaws requiring immediate zero trust segmentation and egress security controls implementation.
Transportation
Transportation systems face systematic data enumeration attacks on passenger records through predictable identifiers, compromising customer trust and operational security frameworks.
Travel/Tourism
Travel booking platforms vulnerable to unauthorized PNR access expose extensive passenger metadata, threatening industry-wide customer confidence and data protection standards.
Sources
- SpiceJet Online Booking Systemhttps://www.cisa.gov/news-events/ics-advisories/icsa-26-113-04Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to exploit the booking API and access sensitive passenger data, thereby reducing the potential blast radius.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit the booking API may have been constrained, reducing unauthorized access to sensitive passenger data.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges may have been limited, reducing the risk of unauthorized access to additional systems.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement within the network may have been constrained, reducing the risk of accessing additional systems.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels may have been limited, reducing the risk of persistent access.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data may have been constrained, reducing the risk of data breaches.
The overall impact of the breach may have been reduced, limiting reputational damage and legal consequences.
Impact at a Glance
Affected Business Functions
- Online Booking System
- Customer Data Management
Estimated downtime: N/A
Estimated loss: N/A
Potential unauthorized access to passenger name records (PNRs) and associated personal information.
Recommended Actions
Key Takeaways & Next Steps
- • Implement strong authentication and authorization mechanisms for all API endpoints to prevent unauthorized access.
- • Utilize Zero Trust Segmentation to enforce least privilege access and limit lateral movement within the network.
- • Deploy Inline IPS (Suricata) to detect and prevent exploitation attempts targeting known vulnerabilities.
- • Establish comprehensive monitoring and logging to detect anomalous activities and potential data exfiltration.
- • Regularly review and update security controls to address emerging threats and vulnerabilities.



