Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11400: SQL Injection in SourceCodester Hotel and Lodge Management System

0
Medium
VulnerabilityCVE-2025-11400cvecve-2025-11400
Published: Tue Oct 07 2025 (10/07/2025, 16:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Hotel and Lodge Management System

Description

A vulnerability was detected in SourceCodester Hotel and Lodge Management System 1.0. This impacts an unknown function of the file /del_room.php. The manipulation of the argument ID results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 10/07/2025, 16:30:19 UTC

Technical Analysis

CVE-2025-11400 is a SQL injection vulnerability identified in version 1.0 of the SourceCodester Hotel and Lodge Management System, specifically within the /del_room.php script. The vulnerability arises due to insufficient sanitization of the 'ID' parameter, which is used to identify rooms for deletion. An attacker can remotely manipulate this parameter to inject arbitrary SQL commands, potentially allowing unauthorized access to or modification of the underlying database. The vulnerability does not require authentication or user interaction, which lowers the barrier for exploitation. The CVSS 4.0 base score is 5.3 (medium), reflecting a network attack vector with low complexity and no privileges required, but with limited impact on confidentiality, integrity, and availability. The exploit is publicly available, increasing the likelihood of exploitation attempts. While no active exploitation has been reported, the presence of publicly known exploit code elevates risk. The vulnerability could be leveraged to extract sensitive hotel data, modify or delete records, or disrupt service availability. The lack of vendor patches or official remediation guidance necessitates immediate defensive measures by users of the affected software.

Potential Impact

For European organizations, particularly those in the hospitality industry using SourceCodester Hotel and Lodge Management System 1.0, this vulnerability poses a risk of unauthorized data access and manipulation. Potential impacts include exposure of guest personal information, reservation details, and financial data, leading to privacy violations and regulatory non-compliance under GDPR. Integrity of booking and room management data could be compromised, causing operational disruptions and reputational damage. Availability of the management system could also be affected if attackers execute destructive SQL commands. Given the hospitality sector's critical role in European economies, especially in countries with large tourism industries, exploitation could have broader economic consequences. The medium severity suggests that while the threat is significant, it may not lead to full system compromise or widespread outages without additional attack steps.

Mitigation Recommendations

To mitigate CVE-2025-11400, organizations should immediately implement strict input validation and sanitization on the 'ID' parameter in /del_room.php. Employing parameterized queries or prepared statements will prevent SQL injection by separating code from data. Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for application connections. Monitor web server and database logs for suspicious activities targeting the vulnerable endpoint. If vendor patches become available, prioritize their deployment. In the absence of official patches, consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the affected parameter. Conduct security audits and penetration testing to verify the effectiveness of mitigations. Additionally, ensure regular backups of critical data to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-07T07:04:06.338Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e53c9ba677756fc9965d67

Added to database: 10/7/2025, 4:15:23 PM

Last enriched: 10/7/2025, 4:30:19 PM

Last updated: 10/7/2025, 7:01:36 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats