Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12226: SQL Injection in SourceCodester Best House Rental Management System

0
Medium
VulnerabilityCVE-2025-12226cvecve-2025-12226
Published: Mon Oct 27 2025 (10/27/2025, 05:02:10 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Best House Rental Management System

Description

A vulnerability was found in SourceCodester Best House Rental Management System 1.0. Impacted is the function save_house of the file /admin_class.php. Performing manipulation of the argument house_no results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 10/27/2025, 05:14:34 UTC

Technical Analysis

CVE-2025-12226 identifies a SQL injection vulnerability in the SourceCodester Best House Rental Management System version 1.0, specifically in the save_house function located in the /admin_class.php file. The vulnerability arises from insufficient sanitization of the house_no parameter, which is directly used in SQL queries without proper validation or parameterization. This flaw allows a remote attacker with authenticated access (high privileges) to inject arbitrary SQL commands, potentially manipulating the backend database. The attack vector is network-based (AV:N), requires no user interaction (UI:N), and no privileges beyond high-level authentication (PR:H). The vulnerability impacts confidentiality, integrity, and availability at a low level but could be leveraged for data exfiltration or modification. Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The absence of patches at the time of publication necessitates immediate mitigation steps. The vulnerability's CVSS 4.0 vector indicates partial impact on data confidentiality, integrity, and availability, with no scope change or security controls bypassed. This vulnerability is particularly relevant for organizations managing rental properties using this system, as it could expose sensitive tenant and property data or disrupt service availability.

Potential Impact

For European organizations, exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive tenant and property data, including personal identification and financial information. This compromises data confidentiality and could result in regulatory non-compliance under GDPR, leading to legal and financial penalties. Integrity of the database could be compromised, allowing attackers to alter rental records or financial transactions, potentially causing operational disruptions and loss of trust. Availability impact is low but possible if attackers execute destructive queries. The requirement for authenticated high privileges limits the attack surface but insider threats or compromised credentials could facilitate exploitation. Organizations in the real estate and property management sectors, especially those relying on the affected software, face increased risk of data breaches and service interruptions. The public disclosure of exploit code elevates the urgency for mitigation to prevent exploitation attempts.

Mitigation Recommendations

1. Apply official patches or updates from SourceCodester as soon as they become available to address the vulnerability directly. 2. Until patches are released, implement strict input validation and sanitization on the house_no parameter, employing parameterized queries or prepared statements to prevent SQL injection. 3. Restrict database user permissions to the minimum necessary, avoiding use of high-privilege accounts for application database connections. 4. Enforce strong authentication and access controls to limit high-privilege user access and monitor for suspicious activities. 5. Conduct regular security audits and code reviews focusing on input handling and database interactions. 6. Deploy Web Application Firewalls (WAFs) with SQL injection detection rules tailored to the application’s traffic patterns. 7. Educate administrators and developers about secure coding practices and the risks of SQL injection. 8. Maintain comprehensive logging and monitoring to detect and respond to potential exploitation attempts promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T16:56:25.616Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68feff90748f7c5f7c9b0427

Added to database: 10/27/2025, 5:13:52 AM

Last enriched: 10/27/2025, 5:14:34 AM

Last updated: 10/27/2025, 8:04:41 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats