Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12856: SQL Injection in code-projects Responsive Hotel Site

0
Medium
VulnerabilityCVE-2025-12856cvecve-2025-12856
Published: Fri Nov 07 2025 (11/07/2025, 13:32:08 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Responsive Hotel Site

Description

A weakness has been identified in code-projects Responsive Hotel Site 1.0. Impacted is an unknown function of the file /admin/reservation.php. This manipulation of the argument email causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 11/14/2025, 14:40:12 UTC

Technical Analysis

CVE-2025-12856 identifies a SQL injection vulnerability in the Responsive Hotel Site version 1.0 developed by code-projects. The flaw exists in the /admin/reservation.php file, where the email parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely but requires the attacker to have high-level privileges (authentication) on the system. The injection could lead to unauthorized access or modification of the backend database, potentially exposing sensitive reservation data or altering booking information. The CVSS 4.0 score is 5.1 (medium), reflecting the need for authentication and limited impact on confidentiality, integrity, and availability. No user interaction is required, and the attack complexity is low. Although no active exploitation has been reported, the availability of public exploit code increases the risk of future attacks. The vulnerability does not affect the system's scope beyond the authenticated administrative interface, limiting its reach but still posing a significant risk to affected organizations. No official patches have been released yet, emphasizing the need for immediate mitigations.

Potential Impact

For European organizations, particularly those in the hospitality and tourism sectors using the Responsive Hotel Site 1.0, this vulnerability could lead to unauthorized access to reservation data, manipulation of booking records, and potential leakage of customer information. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Since the vulnerability requires authenticated access, insider threats or compromised credentials pose the greatest risk. The impact on confidentiality is moderate due to potential data exposure, while integrity could be compromised by unauthorized data modifications. Availability impact is limited but possible if attackers manipulate database queries to disrupt service. Given the importance of tourism to many European economies, exploitation could have broader economic consequences, especially in countries with high volumes of hotel bookings and online reservation systems.

Mitigation Recommendations

Organizations should immediately audit access controls to ensure only trusted administrators have access to the /admin/reservation.php interface. Implement strict input validation and parameterized queries to prevent SQL injection, even if patches are not yet available. Monitor logs for unusual database query patterns or failed login attempts that could indicate exploitation attempts. Employ multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Network segmentation should isolate administrative interfaces from public-facing systems. Regularly back up databases to enable recovery in case of data tampering. Stay alert for official patches or updates from code-projects and apply them promptly once released. Conduct security awareness training for staff to recognize phishing or social engineering attempts that could lead to credential theft. Consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable parameter.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-07T06:58:04.312Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690e03b5623ee59e95cb7e44

Added to database: 11/7/2025, 2:35:33 PM

Last enriched: 11/14/2025, 2:40:12 PM

Last updated: 12/22/2025, 5:37:53 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats