CVE-2025-10796: SQL Injection in code-projects Hostel Management System
A vulnerability was found in code-projects Hostel Management System 1.0. This vulnerability affects unknown code of the file /justines/admin/login.php. The manipulation of the argument email results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2025-10796 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Hostel Management System, specifically within the /justines/admin/login.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which is used in SQL queries without adequate protection against injection attacks. An attacker can remotely exploit this flaw by manipulating the 'email' argument to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This could lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality and integrity of the system's data. The vulnerability requires no authentication or user interaction, making it accessible to any remote attacker. Although the CVSS 4.0 score is 6.9 (medium severity), the exploitability is high due to the lack of required privileges or user interaction. The vulnerability affects only version 1.0 of the Hostel Management System, and no official patches or fixes have been published yet. While no known exploits are currently active in the wild, the public availability of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using the code-projects Hostel Management System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data, including personal information of hostel residents and administrative credentials. Exploitation could lead to unauthorized data disclosure, data tampering, or complete compromise of the management system, disrupting hostel operations. Given that the vulnerability allows remote exploitation without authentication, attackers could leverage it to gain persistent access or pivot to other internal systems. This could have regulatory implications under GDPR due to potential exposure of personal data. Additionally, operational disruptions could affect service availability indirectly, impacting business continuity. The medium severity rating suggests moderate risk, but the ease of exploitation and lack of mitigations increase the urgency for affected organizations to act.
Mitigation Recommendations
Organizations should immediately audit their deployments of the code-projects Hostel Management System to identify any instances running version 1.0. Until an official patch is released, practical mitigations include implementing Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'email' parameter in the /justines/admin/login.php endpoint. Input validation and sanitization should be enforced at the application level, ideally by modifying the source code to use parameterized queries or prepared statements to prevent injection. Network-level controls should restrict access to the admin login page to trusted IP addresses where feasible. Additionally, monitoring and logging of suspicious login attempts and unusual database queries should be enhanced to detect exploitation attempts early. Organizations should also prepare for rapid patch deployment once an official fix becomes available and consider isolating the affected system to limit exposure.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Poland
CVE-2025-10796: SQL Injection in code-projects Hostel Management System
Description
A vulnerability was found in code-projects Hostel Management System 1.0. This vulnerability affects unknown code of the file /justines/admin/login.php. The manipulation of the argument email results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10796 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Hostel Management System, specifically within the /justines/admin/login.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which is used in SQL queries without adequate protection against injection attacks. An attacker can remotely exploit this flaw by manipulating the 'email' argument to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This could lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality and integrity of the system's data. The vulnerability requires no authentication or user interaction, making it accessible to any remote attacker. Although the CVSS 4.0 score is 6.9 (medium severity), the exploitability is high due to the lack of required privileges or user interaction. The vulnerability affects only version 1.0 of the Hostel Management System, and no official patches or fixes have been published yet. While no known exploits are currently active in the wild, the public availability of the exploit code increases the risk of exploitation.
Potential Impact
For European organizations using the code-projects Hostel Management System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data, including personal information of hostel residents and administrative credentials. Exploitation could lead to unauthorized data disclosure, data tampering, or complete compromise of the management system, disrupting hostel operations. Given that the vulnerability allows remote exploitation without authentication, attackers could leverage it to gain persistent access or pivot to other internal systems. This could have regulatory implications under GDPR due to potential exposure of personal data. Additionally, operational disruptions could affect service availability indirectly, impacting business continuity. The medium severity rating suggests moderate risk, but the ease of exploitation and lack of mitigations increase the urgency for affected organizations to act.
Mitigation Recommendations
Organizations should immediately audit their deployments of the code-projects Hostel Management System to identify any instances running version 1.0. Until an official patch is released, practical mitigations include implementing Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'email' parameter in the /justines/admin/login.php endpoint. Input validation and sanitization should be enforced at the application level, ideally by modifying the source code to use parameterized queries or prepared statements to prevent injection. Network-level controls should restrict access to the admin login page to trusted IP addresses where feasible. Additionally, monitoring and logging of suspicious login attempts and unusual database queries should be enhanced to detect exploitation attempts early. Organizations should also prepare for rapid patch deployment once an official fix becomes available and consider isolating the affected system to limit exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T09:29:00.954Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d135599209708d90811cbf
Added to database: 9/22/2025, 11:39:05 AM
Last enriched: 9/22/2025, 11:39:25 AM
Last updated: 9/24/2025, 6:00:51 AM
Views: 10
Related Threats
CVE-2025-48459: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache IoTDB
HighCVE-2025-48392: DoS Vulnerability in Apache Software Foundation Apache IoTDB
HighCVE-2025-59930
LowCVE-2025-59929
LowCVE-2025-59928
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.