Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12226: SQL Injection in SourceCodester Best House Rental Management System

0
Medium
VulnerabilityCVE-2025-12226cvecve-2025-12226
Published: Mon Oct 27 2025 (10/27/2025, 05:02:10 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Best House Rental Management System

Description

A vulnerability was found in SourceCodester Best House Rental Management System 1.0. Impacted is the function save_house of the file /admin_class.php. Performing manipulation of the argument house_no results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 11/03/2025, 06:11:43 UTC

Technical Analysis

CVE-2025-12226 identifies a SQL Injection vulnerability in the SourceCodester Best House Rental Management System version 1.0, specifically within the save_house function of the /admin_class.php file. The vulnerability arises from improper validation and sanitization of the house_no parameter, which is directly used in SQL queries. An attacker with high privileges can remotely manipulate this parameter to inject malicious SQL commands, potentially allowing unauthorized access to or modification of the backend database. The vulnerability does not require user interaction but does require the attacker to have some level of authenticated access (high privileges). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H means high privileges required), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known exploits are currently active in the wild, the public availability of exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a niche rental management system commonly used by small to medium property management firms. The lack of official patches or updates at the time of publication means organizations must implement manual mitigations or code fixes to address the issue.

Potential Impact

For European organizations using the SourceCodester Best House Rental Management System 1.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized disclosure of sensitive rental data, alteration or deletion of property records, and potential disruption of rental management operations. This could result in financial losses, reputational damage, and regulatory non-compliance, especially under GDPR due to potential exposure of personal data. The requirement for high privileges limits the attack surface to insiders or compromised accounts, but the remote exploitability increases the risk if credential theft occurs. Organizations in the real estate and property management sectors are particularly vulnerable, as they rely heavily on accurate and secure management of rental information. The medium severity rating reflects the balance between the potential impact and the exploitation complexity.

Mitigation Recommendations

To mitigate CVE-2025-12226, organizations should: 1) Immediately review and restrict access controls to ensure only trusted administrators have high-level privileges required to exploit this vulnerability. 2) Implement input validation and parameterized queries or prepared statements in the save_house function to sanitize the house_no parameter and prevent SQL injection. 3) Conduct a thorough code audit of the entire application to identify and remediate similar injection flaws. 4) Monitor logs for suspicious database queries or unusual administrative activity that could indicate exploitation attempts. 5) If possible, isolate the rental management system behind additional security layers such as web application firewalls (WAFs) configured to detect and block SQL injection patterns. 6) Engage with the vendor or community to obtain patches or updates addressing this vulnerability. 7) Educate administrative users on secure credential management to reduce the risk of account compromise. 8) Regularly back up databases to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-25T16:56:25.616Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68feff90748f7c5f7c9b0427

Added to database: 10/27/2025, 5:13:52 AM

Last enriched: 11/3/2025, 6:11:43 AM

Last updated: 12/8/2025, 8:50:24 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats