Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12594: SQL Injection in code-projects Simple Online Hotel Reservation System

0
Medium
VulnerabilityCVE-2025-12594cvecve-2025-12594
Published: Sun Nov 02 2025 (11/02/2025, 08:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Online Hotel Reservation System

Description

A security flaw has been discovered in code-projects Simple Online Hotel Reservation System 2.0. This affects an unknown function of the file /admin/add_account.php. The manipulation of the argument Name results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 11/10/2025, 02:27:46 UTC

Technical Analysis

CVE-2025-12594 identifies a SQL injection vulnerability in the Simple Online Hotel Reservation System version 2.0 developed by code-projects. The vulnerability resides in the /admin/add_account.php script, where the 'Name' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection can be performed remotely without user interaction but requires the attacker to have high privileges, likely administrative access to the system. The vulnerability enables partial compromise of the database's confidentiality, integrity, and availability, potentially allowing unauthorized data access, modification, or deletion. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no public exploits are currently observed in the wild, the exploit code has been released publicly, increasing the risk of exploitation. The vulnerability affects only version 2.0 of this specific hotel reservation system, which is a niche product primarily used by small to medium hospitality businesses. The lack of patches or official fixes at the time of publication increases the urgency for affected organizations to implement mitigations. The vulnerability's exploitation could lead to unauthorized database queries, data leakage, or manipulation, impacting business operations and customer data security.

Potential Impact

For European organizations, particularly those in the hospitality sector using the Simple Online Hotel Reservation System 2.0, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and booking information, potentially violating GDPR requirements and resulting in regulatory penalties. Data integrity could be compromised, leading to incorrect bookings or financial discrepancies. Availability impacts may disrupt reservation services, harming business reputation and revenue. Since the vulnerability requires high privileges, the risk is somewhat mitigated by internal access controls; however, insider threats or compromised admin accounts could be leveraged for exploitation. The public release of exploit code increases the likelihood of opportunistic attacks, especially against less-secured or outdated systems. European hospitality businesses with limited cybersecurity resources may be particularly vulnerable. Additionally, the breach of customer data could have broader reputational and legal consequences across the EU.

Mitigation Recommendations

Organizations should immediately audit their use of the Simple Online Hotel Reservation System and verify if version 2.0 is deployed. If so, restrict access to the /admin/add_account.php interface strictly to trusted administrators via network segmentation and VPNs. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'Name' parameter. Apply input validation and sanitization on all user-supplied data, especially in administrative modules. Where possible, modify the source code to use parameterized queries or prepared statements to eliminate SQL injection vectors. Monitor logs for suspicious activity related to the admin interface and unusual database queries. If vendor patches become available, prioritize their deployment. Conduct regular security training for administrators to prevent credential compromise. Finally, consider migrating to more secure or actively maintained reservation systems if remediation is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-01T15:58:21.389Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69071a8adb62f9b0ce09a13a

Added to database: 11/2/2025, 8:47:06 AM

Last enriched: 11/10/2025, 2:27:46 AM

Last updated: 12/15/2025, 7:31:03 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats