Skip to main content

CVE-2025-10813: SQL Injection in code-projects Hostel Management System

Medium
VulnerabilityCVE-2025-10813cvecve-2025-10813
Published: Mon Sep 22 2025 (09/22/2025, 20:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Hostel Management System

Description

A vulnerability was found in code-projects Hostel Management System 1.0. Affected is an unknown function of the file /justines/admin/mod_reports/index.php. The manipulation of the argument Home results in sql injection. It is possible to launch the attack remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 20:09:54 UTC

Technical Analysis

CVE-2025-10813 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Hostel Management System, specifically within an unknown function located in the /justines/admin/mod_reports/index.php file. The vulnerability arises from improper sanitization or validation of the 'Home' argument, which can be manipulated by an attacker to inject malicious SQL code. This flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to limited, suggesting that while data exposure or modification is possible, it may be constrained by the application's design or database permissions. No patches or fixes have been published yet, and although the exploit code is publicly available, there are no confirmed reports of exploitation in the wild. The vulnerability's presence in an administrative module (mod_reports) suggests that successful exploitation could allow attackers to access or manipulate reporting data, potentially leading to unauthorized data disclosure or corruption within the hostel management system's database.

Potential Impact

For European organizations using the code-projects Hostel Management System version 1.0, this vulnerability poses a tangible risk of unauthorized data access or manipulation. Given that hostel management systems often store sensitive personal information about residents, including identification details, contact information, and possibly payment data, exploitation could lead to breaches of personal data protected under GDPR. The ability to execute SQL injection remotely without authentication increases the risk profile, as attackers can target exposed systems directly over the network. Although the CVSS score indicates medium severity with limited impact, the potential for data integrity compromise or leakage could disrupt operations, damage reputation, and result in regulatory penalties. Organizations relying on this software for managing student or visitor accommodations should be particularly vigilant, as the exposure of personal data could have significant privacy implications. Additionally, if the database contains credentials or other critical operational data, attackers might leverage this vulnerability as a foothold for further network intrusion or lateral movement.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, restrict network access to the affected administrative module by implementing firewall rules or VPN requirements to limit exposure to trusted internal users only. Conduct thorough input validation and sanitization on the 'Home' parameter at the web application firewall (WAF) level to detect and block SQL injection payloads. Employ parameterized queries or prepared statements if source code access and modification are possible to remediate the root cause. Regularly monitor web server and database logs for suspicious query patterns indicative of SQL injection attempts. Additionally, perform a comprehensive security assessment of the Hostel Management System deployment to identify any other potential vulnerabilities. Organizations should also consider isolating the affected system within a segmented network zone to minimize lateral movement risks. Finally, maintain up-to-date backups of the database to enable recovery in case of data corruption or loss resulting from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-21T10:12:21.647Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d1ac52392f2f9b111eeef3

Added to database: 9/22/2025, 8:06:42 PM

Last enriched: 9/22/2025, 8:09:54 PM

Last updated: 9/22/2025, 9:58:34 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats