Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12855: SQL Injection in code-projects Responsive Hotel Site

0
Medium
VulnerabilityCVE-2025-12855cvecve-2025-12855
Published: Fri Nov 07 2025 (11/07/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Responsive Hotel Site

Description

A security flaw has been discovered in code-projects Responsive Hotel Site 1.0. This issue affects some unknown processing of the file /admin/newsletterdel.php. The manipulation of the argument eid results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 11/07/2025, 14:36:01 UTC

Technical Analysis

CVE-2025-12855 is a SQL injection vulnerability identified in the Responsive Hotel Site 1.0 developed by code-projects. The vulnerability exists in the /admin/newsletterdel.php script, where the 'eid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without user interaction but requires high privileges (authentication) to access the vulnerable admin functionality. The vulnerability could lead to unauthorized reading, modification, or deletion of database records, impacting confidentiality, integrity, and availability of the affected system. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), but requires privileges (PR:H), and results in low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No official patches have been released yet, and no known exploits are reported in the wild, though a public exploit code has been published. This vulnerability primarily affects organizations using this specific hotel site software, which is typically deployed in hospitality environments to manage newsletters and customer communications.

Potential Impact

For European organizations, especially those in the hospitality and tourism sectors using the Responsive Hotel Site 1.0, this vulnerability poses a risk of unauthorized database access and manipulation. Attackers with administrative credentials could exploit the SQL injection to extract sensitive customer data, alter booking or newsletter information, or disrupt service availability. This could lead to data breaches involving personal identifiable information (PII), regulatory non-compliance under GDPR, reputational damage, and operational downtime. Although exploitation requires authenticated access, insider threats or compromised credentials could facilitate attacks. The impact is heightened in countries with large tourism industries and widespread use of this software, potentially affecting customer trust and business continuity.

Mitigation Recommendations

Organizations should immediately audit their use of code-projects Responsive Hotel Site 1.0 and restrict access to the /admin/newsletterdel.php endpoint to trusted administrators only, ideally via VPN or IP whitelisting. Implement strict input validation and parameterized queries or prepared statements to prevent SQL injection. Monitor logs for suspicious activity targeting the 'eid' parameter. Since no official patch is currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts against this endpoint. Enforce strong authentication mechanisms and regularly rotate admin credentials to reduce the risk of privilege abuse. Plan for timely patching once the vendor releases an update. Conduct security awareness training to prevent credential compromise. Finally, perform regular security assessments and penetration testing focused on admin interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-07T06:58:01.178Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690e03b5623ee59e95cb7e3d

Added to database: 11/7/2025, 2:35:33 PM

Last enriched: 11/7/2025, 2:36:01 PM

Last updated: 11/8/2025, 6:22:00 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats