Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12853: SQL Injection in SourceCodester Best House Rental Management System

0
Medium
VulnerabilityCVE-2025-12853cvecve-2025-12853
Published: Fri Nov 07 2025 (11/07/2025, 12:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Best House Rental Management System

Description

CVE-2025-12853 is a medium-severity SQL injection vulnerability found in version 1. 0 of the SourceCodester Best House Rental Management System. The flaw exists in the delete_house function within the /admin_class. php file, where manipulation of the ID parameter allows an attacker to inject malicious SQL commands. This vulnerability can be exploited remotely without user interaction or authentication, although it requires high privileges. The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, potentially allowing unauthorized data access or modification. No public exploits are currently known in the wild, and no patches have been published yet. European organizations using this software for property management could face data breaches or service disruptions if exploited. Mitigation should focus on input validation, parameterized queries, and restricting access to administrative functions. Countries with higher adoption of SourceCodester products and significant real estate management sectors are at greater risk.

AI-Powered Analysis

AILast updated: 11/14/2025, 13:49:31 UTC

Technical Analysis

CVE-2025-12853 identifies a SQL injection vulnerability in the SourceCodester Best House Rental Management System version 1.0, specifically in the delete_house function located in /admin_class.php. The vulnerability arises from improper sanitization of the ID parameter, which is used directly in SQL queries. An attacker with high privileges can remotely manipulate this parameter to inject arbitrary SQL commands, potentially leading to unauthorized data retrieval, modification, or deletion within the backend database. The vulnerability does not require user interaction but does require elevated privileges, limiting the attack surface to authenticated administrators or users with similar rights. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H), no user interaction (UI:N), and low impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no known public exploits exist, the vulnerability is publicly disclosed, increasing the risk of future exploitation. The absence of patches or mitigations from the vendor increases the urgency for organizations to implement defensive measures. This vulnerability could be leveraged to compromise sensitive rental data, disrupt service availability, or escalate privileges within the application environment.

Potential Impact

For European organizations using the SourceCodester Best House Rental Management System, this vulnerability poses risks including unauthorized access to tenant and property data, potential data corruption, and disruption of rental management operations. Confidential information such as tenant identities, rental agreements, and payment details could be exposed or altered, leading to privacy violations and regulatory non-compliance under GDPR. The integrity of rental records may be compromised, affecting business operations and trustworthiness. Availability impacts could result from database manipulation causing service outages or data loss. Given the medium severity and requirement for high privileges, the threat is more significant for organizations with weak internal access controls or insufficient monitoring. The exposure of this vulnerability could also facilitate lateral movement within networks if attackers escalate privileges or pivot from compromised administrative accounts.

Mitigation Recommendations

Organizations should immediately audit and restrict administrative access to the Best House Rental Management System, ensuring only trusted personnel have high privileges. Implement strict input validation and sanitization for all parameters, especially the ID argument in the delete_house function. Where possible, refactor the application code to use parameterized queries or prepared statements to prevent SQL injection. Monitor logs for unusual database queries or failed access attempts that could indicate exploitation attempts. Network segmentation should isolate the rental management system from broader enterprise networks to limit lateral movement. Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this vulnerability. Regularly back up databases and test restoration procedures to mitigate data loss risks. Engage with the vendor or community to track patch availability and apply updates promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-07T06:52:36.608Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690de966fb039e6a5680e604

Added to database: 11/7/2025, 12:43:18 PM

Last enriched: 11/14/2025, 1:49:31 PM

Last updated: 12/23/2025, 12:30:01 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats