Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12598: SQL Injection in SourceCodester Best House Rental Management System

0
Medium
VulnerabilityCVE-2025-12598cvecve-2025-12598
Published: Sun Nov 02 2025 (11/02/2025, 12:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Best House Rental Management System

Description

A flaw has been found in SourceCodester Best House Rental Management System 1.0. Affected by this issue is the function save_tenant of the file /admin_class.php. Executing manipulation of the argument firstname can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. Other parameters might be affected as well.

AI-Powered Analysis

AILast updated: 11/10/2025, 02:30:16 UTC

Technical Analysis

CVE-2025-12598 identifies a SQL injection vulnerability in SourceCodester Best House Rental Management System version 1.0, specifically in the save_tenant function located in /admin_class.php. The vulnerability arises from improper sanitization or validation of the firstname parameter, allowing an attacker to inject malicious SQL code remotely. This flaw can be exploited without authentication or user interaction, increasing the risk of unauthorized database access or manipulation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system confidentiality, integrity, or availability completely but can lead to significant data exposure or modification. Although no official patch has been released, a public exploit exists, which raises the risk of exploitation. The vulnerability could allow attackers to extract sensitive tenant information, alter rental records, or disrupt system operations, impacting business continuity and data privacy. The lack of authentication requirements and remote exploitability make this a notable risk for organizations using this software in their property management workflows.

Potential Impact

For European organizations, this vulnerability poses a moderate risk to the confidentiality, integrity, and availability of tenant and rental data managed by the affected system. Unauthorized access to tenant information could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. Data manipulation could disrupt rental operations, causing financial losses and operational downtime. The remote exploitability without authentication increases the attack surface, especially for organizations exposing the management system to the internet. Real estate agencies, property management firms, and landlords using this software in Europe could face targeted attacks aiming to extract sensitive personal data or sabotage rental records. The impact is heightened in countries with strict data protection laws and significant rental markets, where data breaches can have severe legal and financial consequences.

Mitigation Recommendations

Organizations should immediately review their deployment of SourceCodester Best House Rental Management System version 1.0 and restrict external access to the affected application, ideally isolating it behind VPNs or internal networks. Implement input validation and sanitization on all user-supplied data, particularly the firstname parameter in the save_tenant function. Where possible, modify the source code to use parameterized queries or prepared statements to eliminate SQL injection risks. Monitor network traffic for suspicious activity targeting the /admin_class.php endpoint. Conduct regular security assessments and code reviews to identify similar injection points. If a patch becomes available from the vendor, prioritize its deployment. Additionally, enforce strict access controls and logging to detect and respond to potential exploitation attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to block SQL injection payloads targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-01T17:23:05.163Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69074a3c2c5f3d6573056ea6

Added to database: 11/2/2025, 12:10:36 PM

Last enriched: 11/10/2025, 2:30:16 AM

Last updated: 12/16/2025, 1:28:16 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats