Skip to main content

CVE-2025-10796: SQL Injection in code-projects Hostel Management System

Medium
VulnerabilityCVE-2025-10796cvecve-2025-10796
Published: Mon Sep 22 2025 (09/22/2025, 11:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Hostel Management System

Description

A vulnerability was found in code-projects Hostel Management System 1.0. This vulnerability affects unknown code of the file /justines/admin/login.php. The manipulation of the argument email results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 11:39:25 UTC

Technical Analysis

CVE-2025-10796 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Hostel Management System, specifically within the /justines/admin/login.php file. The vulnerability arises from improper sanitization or validation of the 'email' parameter, which is used in SQL queries without adequate protection against injection attacks. An attacker can remotely exploit this flaw by manipulating the 'email' argument to inject malicious SQL code, potentially allowing unauthorized access to the backend database. This could lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality and integrity of the system's data. The vulnerability requires no authentication or user interaction, making it accessible to any remote attacker. Although the CVSS 4.0 score is 6.9 (medium severity), the exploitability is high due to the lack of required privileges or user interaction. The vulnerability affects only version 1.0 of the Hostel Management System, and no official patches or fixes have been published yet. While no known exploits are currently active in the wild, the public availability of the exploit code increases the risk of exploitation.

Potential Impact

For European organizations using the code-projects Hostel Management System version 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of sensitive data, including personal information of hostel residents and administrative credentials. Exploitation could lead to unauthorized data disclosure, data tampering, or complete compromise of the management system, disrupting hostel operations. Given that the vulnerability allows remote exploitation without authentication, attackers could leverage it to gain persistent access or pivot to other internal systems. This could have regulatory implications under GDPR due to potential exposure of personal data. Additionally, operational disruptions could affect service availability indirectly, impacting business continuity. The medium severity rating suggests moderate risk, but the ease of exploitation and lack of mitigations increase the urgency for affected organizations to act.

Mitigation Recommendations

Organizations should immediately audit their deployments of the code-projects Hostel Management System to identify any instances running version 1.0. Until an official patch is released, practical mitigations include implementing Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'email' parameter in the /justines/admin/login.php endpoint. Input validation and sanitization should be enforced at the application level, ideally by modifying the source code to use parameterized queries or prepared statements to prevent injection. Network-level controls should restrict access to the admin login page to trusted IP addresses where feasible. Additionally, monitoring and logging of suspicious login attempts and unusual database queries should be enhanced to detect exploitation attempts early. Organizations should also prepare for rapid patch deployment once an official fix becomes available and consider isolating the affected system to limit exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T09:29:00.954Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d135599209708d90811cbf

Added to database: 9/22/2025, 11:39:05 AM

Last enriched: 9/22/2025, 11:39:25 AM

Last updated: 9/24/2025, 6:00:51 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats