CVE-2025-12855: SQL Injection in code-projects Responsive Hotel Site
A security flaw has been discovered in code-projects Responsive Hotel Site 1.0. This issue affects some unknown processing of the file /admin/newsletterdel.php. The manipulation of the argument eid results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-12855 is a SQL injection vulnerability identified in the Responsive Hotel Site 1.0 developed by code-projects. The vulnerability exists in the /admin/newsletterdel.php script, where the 'eid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without user interaction but requires high privileges (authentication) to access the vulnerable admin functionality. The vulnerability could lead to unauthorized reading, modification, or deletion of database records, impacting confidentiality, integrity, and availability of the affected system. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), but requires privileges (PR:H), and results in low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No official patches have been released yet, and no known exploits are reported in the wild, though a public exploit code has been published. This vulnerability primarily affects organizations using this specific hotel site software, which is typically deployed in hospitality environments to manage newsletters and customer communications.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors using the Responsive Hotel Site 1.0, this vulnerability poses a risk of unauthorized database access and manipulation. Attackers with administrative credentials could exploit the SQL injection to extract sensitive customer data, alter booking or newsletter information, or disrupt service availability. This could lead to data breaches involving personal identifiable information (PII), regulatory non-compliance under GDPR, reputational damage, and operational downtime. Although exploitation requires authenticated access, insider threats or compromised credentials could facilitate attacks. The impact is heightened in countries with large tourism industries and widespread use of this software, potentially affecting customer trust and business continuity.
Mitigation Recommendations
Organizations should immediately audit their use of code-projects Responsive Hotel Site 1.0 and restrict access to the /admin/newsletterdel.php endpoint to trusted administrators only, ideally via VPN or IP whitelisting. Implement strict input validation and parameterized queries or prepared statements to prevent SQL injection. Monitor logs for suspicious activity targeting the 'eid' parameter. Since no official patch is currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts against this endpoint. Enforce strong authentication mechanisms and regularly rotate admin credentials to reduce the risk of privilege abuse. Plan for timely patching once the vendor releases an update. Conduct security awareness training to prevent credential compromise. Finally, perform regular security assessments and penetration testing focused on admin interfaces.
Affected Countries
Spain, Italy, France, Germany, United Kingdom, Portugal, Greece
CVE-2025-12855: SQL Injection in code-projects Responsive Hotel Site
Description
A security flaw has been discovered in code-projects Responsive Hotel Site 1.0. This issue affects some unknown processing of the file /admin/newsletterdel.php. The manipulation of the argument eid results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-12855 is a SQL injection vulnerability identified in the Responsive Hotel Site 1.0 developed by code-projects. The vulnerability exists in the /admin/newsletterdel.php script, where the 'eid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without user interaction but requires high privileges (authentication) to access the vulnerable admin functionality. The vulnerability could lead to unauthorized reading, modification, or deletion of database records, impacting confidentiality, integrity, and availability of the affected system. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), but requires privileges (PR:H), and results in low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No official patches have been released yet, and no known exploits are reported in the wild, though a public exploit code has been published. This vulnerability primarily affects organizations using this specific hotel site software, which is typically deployed in hospitality environments to manage newsletters and customer communications.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors using the Responsive Hotel Site 1.0, this vulnerability poses a risk of unauthorized database access and manipulation. Attackers with administrative credentials could exploit the SQL injection to extract sensitive customer data, alter booking or newsletter information, or disrupt service availability. This could lead to data breaches involving personal identifiable information (PII), regulatory non-compliance under GDPR, reputational damage, and operational downtime. Although exploitation requires authenticated access, insider threats or compromised credentials could facilitate attacks. The impact is heightened in countries with large tourism industries and widespread use of this software, potentially affecting customer trust and business continuity.
Mitigation Recommendations
Organizations should immediately audit their use of code-projects Responsive Hotel Site 1.0 and restrict access to the /admin/newsletterdel.php endpoint to trusted administrators only, ideally via VPN or IP whitelisting. Implement strict input validation and parameterized queries or prepared statements to prevent SQL injection. Monitor logs for suspicious activity targeting the 'eid' parameter. Since no official patch is currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts against this endpoint. Enforce strong authentication mechanisms and regularly rotate admin credentials to reduce the risk of privilege abuse. Plan for timely patching once the vendor releases an update. Conduct security awareness training to prevent credential compromise. Finally, perform regular security assessments and penetration testing focused on admin interfaces.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-07T06:58:01.178Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690e03b5623ee59e95cb7e3d
Added to database: 11/7/2025, 2:35:33 PM
Last enriched: 11/7/2025, 2:36:01 PM
Last updated: 11/8/2025, 6:22:00 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Honeypot: Requests for (Code) Repositories, (Sat, Nov 8th)
MediumCVE-2025-9334: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesolz Better Find and Replace – AI-Powered Suggestions
HighCVE-2025-7663: CWE-862 Missing Authorization in ovatheme Ovatheme Events Manager
MediumCVE-2025-12353: CWE-639 Authorization Bypass Through User-Controlled Key in getwpfunnels Easy WordPress Funnel Builder To Collect Leads And Increase Sales – WPFunnels
MediumCVE-2025-12193: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in kitae-park Mang Board WP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.