CVE-2025-12598: SQL Injection in SourceCodester Best House Rental Management System
A flaw has been found in SourceCodester Best House Rental Management System 1.0. Affected by this issue is the function save_tenant of the file /admin_class.php. Executing manipulation of the argument firstname can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. Other parameters might be affected as well.
AI Analysis
Technical Summary
CVE-2025-12598 identifies a SQL injection vulnerability in SourceCodester Best House Rental Management System version 1.0, specifically in the save_tenant function located in /admin_class.php. The vulnerability arises from improper sanitization or validation of the firstname parameter, allowing an attacker to inject malicious SQL code remotely. This flaw can be exploited without authentication or user interaction, increasing the risk of unauthorized database access or manipulation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system confidentiality, integrity, or availability completely but can lead to significant data exposure or modification. Although no official patch has been released, a public exploit exists, which raises the risk of exploitation. The vulnerability could allow attackers to extract sensitive tenant information, alter rental records, or disrupt system operations, impacting business continuity and data privacy. The lack of authentication requirements and remote exploitability make this a notable risk for organizations using this software in their property management workflows.
Potential Impact
For European organizations, this vulnerability poses a moderate risk to the confidentiality, integrity, and availability of tenant and rental data managed by the affected system. Unauthorized access to tenant information could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. Data manipulation could disrupt rental operations, causing financial losses and operational downtime. The remote exploitability without authentication increases the attack surface, especially for organizations exposing the management system to the internet. Real estate agencies, property management firms, and landlords using this software in Europe could face targeted attacks aiming to extract sensitive personal data or sabotage rental records. The impact is heightened in countries with strict data protection laws and significant rental markets, where data breaches can have severe legal and financial consequences.
Mitigation Recommendations
Organizations should immediately review their deployment of SourceCodester Best House Rental Management System version 1.0 and restrict external access to the affected application, ideally isolating it behind VPNs or internal networks. Implement input validation and sanitization on all user-supplied data, particularly the firstname parameter in the save_tenant function. Where possible, modify the source code to use parameterized queries or prepared statements to eliminate SQL injection risks. Monitor network traffic for suspicious activity targeting the /admin_class.php endpoint. Conduct regular security assessments and code reviews to identify similar injection points. If a patch becomes available from the vendor, prioritize its deployment. Additionally, enforce strict access controls and logging to detect and respond to potential exploitation attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to block SQL injection payloads targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-12598: SQL Injection in SourceCodester Best House Rental Management System
Description
A flaw has been found in SourceCodester Best House Rental Management System 1.0. Affected by this issue is the function save_tenant of the file /admin_class.php. Executing manipulation of the argument firstname can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used. Other parameters might be affected as well.
AI-Powered Analysis
Technical Analysis
CVE-2025-12598 identifies a SQL injection vulnerability in SourceCodester Best House Rental Management System version 1.0, specifically in the save_tenant function located in /admin_class.php. The vulnerability arises from improper sanitization or validation of the firstname parameter, allowing an attacker to inject malicious SQL code remotely. This flaw can be exploited without authentication or user interaction, increasing the risk of unauthorized database access or manipulation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system confidentiality, integrity, or availability completely but can lead to significant data exposure or modification. Although no official patch has been released, a public exploit exists, which raises the risk of exploitation. The vulnerability could allow attackers to extract sensitive tenant information, alter rental records, or disrupt system operations, impacting business continuity and data privacy. The lack of authentication requirements and remote exploitability make this a notable risk for organizations using this software in their property management workflows.
Potential Impact
For European organizations, this vulnerability poses a moderate risk to the confidentiality, integrity, and availability of tenant and rental data managed by the affected system. Unauthorized access to tenant information could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. Data manipulation could disrupt rental operations, causing financial losses and operational downtime. The remote exploitability without authentication increases the attack surface, especially for organizations exposing the management system to the internet. Real estate agencies, property management firms, and landlords using this software in Europe could face targeted attacks aiming to extract sensitive personal data or sabotage rental records. The impact is heightened in countries with strict data protection laws and significant rental markets, where data breaches can have severe legal and financial consequences.
Mitigation Recommendations
Organizations should immediately review their deployment of SourceCodester Best House Rental Management System version 1.0 and restrict external access to the affected application, ideally isolating it behind VPNs or internal networks. Implement input validation and sanitization on all user-supplied data, particularly the firstname parameter in the save_tenant function. Where possible, modify the source code to use parameterized queries or prepared statements to eliminate SQL injection risks. Monitor network traffic for suspicious activity targeting the /admin_class.php endpoint. Conduct regular security assessments and code reviews to identify similar injection points. If a patch becomes available from the vendor, prioritize its deployment. Additionally, enforce strict access controls and logging to detect and respond to potential exploitation attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to block SQL injection payloads targeting this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-01T17:23:05.163Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69074a3c2c5f3d6573056ea6
Added to database: 11/2/2025, 12:10:36 PM
Last enriched: 11/10/2025, 2:30:16 AM
Last updated: 12/16/2025, 1:28:16 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14780: SQL Injection in Xiongwei Smart Catering Cloud Platform
MediumWhy Data Security and Privacy Need to Start in Code
MediumCVE-2025-65076: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server
HighCVE-2025-65075: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server
MediumCVE-2025-65074: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.