CVE-2025-10789: SQL Injection in SourceCodester Online Hotel Reservation System
A vulnerability was identified in SourceCodester Online Hotel Reservation System 1.0. The impacted element is an unknown function of the file deleteslide.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-10789 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Hotel Reservation System. The vulnerability resides in an unspecified function within the deleteslide.php file, where the manipulation of the 'ID' parameter allows an attacker to inject malicious SQL code. This injection flaw enables remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting that while exploitation can lead to unauthorized data access or modification, the scope and severity of damage are somewhat constrained. The vulnerability is publicly known, and proof-of-concept exploits are available, although no active exploitation in the wild has been reported to date. The lack of a patch or vendor-provided fix increases the risk for organizations running this specific version of the software. Given that the vulnerability affects a hotel reservation system, attackers could potentially access or manipulate booking data, customer information, or other sensitive records stored in the backend database, leading to privacy violations and operational disruptions.
Potential Impact
For European organizations, particularly those in the hospitality sector using the SourceCodester Online Hotel Reservation System version 1.0, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized access to customer personal data, including booking details and potentially payment information if stored insecurely. This could result in violations of the EU General Data Protection Regulation (GDPR), leading to significant legal and financial penalties. Additionally, manipulation of reservation data could disrupt business operations, causing reputational damage and loss of customer trust. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially from opportunistic threat actors scanning for vulnerable systems. Although the impact is rated medium, the hospitality industry’s reliance on reservation systems makes this vulnerability a critical concern for maintaining service continuity and data privacy compliance in Europe.
Mitigation Recommendations
Organizations should immediately assess whether they are running SourceCodester Online Hotel Reservation System version 1.0. In the absence of an official patch, the following specific measures are recommended: 1) Implement Web Application Firewall (WAF) rules to detect and block SQL injection attempts targeting the deleteslide.php endpoint, particularly filtering suspicious input in the 'ID' parameter. 2) Conduct a thorough code review and apply input validation and parameterized queries or prepared statements to sanitize the 'ID' parameter and other user inputs. 3) Restrict direct internet access to the reservation system or isolate it within a segmented network zone with strict access controls. 4) Monitor logs for unusual database queries or errors indicative of injection attempts. 5) Plan for an upgrade or migration to a patched or alternative reservation system version that addresses this vulnerability. 6) Regularly back up reservation data and test restoration procedures to mitigate potential data integrity issues from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-10789: SQL Injection in SourceCodester Online Hotel Reservation System
Description
A vulnerability was identified in SourceCodester Online Hotel Reservation System 1.0. The impacted element is an unknown function of the file deleteslide.php. The manipulation of the argument ID leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10789 is a SQL Injection vulnerability identified in version 1.0 of the SourceCodester Online Hotel Reservation System. The vulnerability resides in an unspecified function within the deleteslide.php file, where the manipulation of the 'ID' parameter allows an attacker to inject malicious SQL code. This injection flaw enables remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting that while exploitation can lead to unauthorized data access or modification, the scope and severity of damage are somewhat constrained. The vulnerability is publicly known, and proof-of-concept exploits are available, although no active exploitation in the wild has been reported to date. The lack of a patch or vendor-provided fix increases the risk for organizations running this specific version of the software. Given that the vulnerability affects a hotel reservation system, attackers could potentially access or manipulate booking data, customer information, or other sensitive records stored in the backend database, leading to privacy violations and operational disruptions.
Potential Impact
For European organizations, particularly those in the hospitality sector using the SourceCodester Online Hotel Reservation System version 1.0, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized access to customer personal data, including booking details and potentially payment information if stored insecurely. This could result in violations of the EU General Data Protection Regulation (GDPR), leading to significant legal and financial penalties. Additionally, manipulation of reservation data could disrupt business operations, causing reputational damage and loss of customer trust. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, especially from opportunistic threat actors scanning for vulnerable systems. Although the impact is rated medium, the hospitality industry’s reliance on reservation systems makes this vulnerability a critical concern for maintaining service continuity and data privacy compliance in Europe.
Mitigation Recommendations
Organizations should immediately assess whether they are running SourceCodester Online Hotel Reservation System version 1.0. In the absence of an official patch, the following specific measures are recommended: 1) Implement Web Application Firewall (WAF) rules to detect and block SQL injection attempts targeting the deleteslide.php endpoint, particularly filtering suspicious input in the 'ID' parameter. 2) Conduct a thorough code review and apply input validation and parameterized queries or prepared statements to sanitize the 'ID' parameter and other user inputs. 3) Restrict direct internet access to the reservation system or isolate it within a segmented network zone with strict access controls. 4) Monitor logs for unusual database queries or errors indicative of injection attempts. 5) Plan for an upgrade or migration to a patched or alternative reservation system version that addresses this vulnerability. 6) Regularly back up reservation data and test restoration procedures to mitigate potential data integrity issues from exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T09:16:04.833Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d103c34b809de657261e0f
Added to database: 9/22/2025, 8:07:31 AM
Last enriched: 9/22/2025, 8:08:21 AM
Last updated: 11/21/2025, 9:58:15 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65092: CWE-125: Out-of-bounds Read in espressif esp-idf
MediumCVE-2025-0504: CWE-266: Incorrect Privilege Assignment in Black Duck Black Duck SCA
MediumCVE-2025-65102: CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in pjsip pjproject
HighCVE-2025-65106: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in langchain-ai langchain
HighCVE-2025-43374: An attacker in physical proximity may be able to cause an out-of-bounds read in kernel memory in Apple macOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.