CVE-2025-12856: SQL Injection in code-projects Responsive Hotel Site
A weakness has been identified in code-projects Responsive Hotel Site 1.0. Impacted is an unknown function of the file /admin/reservation.php. This manipulation of the argument email causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-12856 identifies a SQL injection vulnerability in the Responsive Hotel Site version 1.0 developed by code-projects. The flaw exists in the /admin/reservation.php file, where the email parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely but requires the attacker to have high-level privileges (authentication) on the system. The injection could lead to unauthorized access or modification of the backend database, potentially exposing sensitive reservation data or altering booking information. The CVSS 4.0 score is 5.1 (medium), reflecting the need for authentication and limited impact on confidentiality, integrity, and availability. No user interaction is required, and the attack complexity is low. Although no active exploitation has been reported, the availability of public exploit code increases the risk of future attacks. The vulnerability does not affect the system's scope beyond the authenticated administrative interface, limiting its reach but still posing a significant risk to affected organizations. No official patches have been released yet, emphasizing the need for immediate mitigations.
Potential Impact
For European organizations, particularly those in the hospitality and tourism sectors using the Responsive Hotel Site 1.0, this vulnerability could lead to unauthorized access to reservation data, manipulation of booking records, and potential leakage of customer information. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Since the vulnerability requires authenticated access, insider threats or compromised credentials pose the greatest risk. The impact on confidentiality is moderate due to potential data exposure, while integrity could be compromised by unauthorized data modifications. Availability impact is limited but possible if attackers manipulate database queries to disrupt service. Given the importance of tourism to many European economies, exploitation could have broader economic consequences, especially in countries with high volumes of hotel bookings and online reservation systems.
Mitigation Recommendations
Organizations should immediately audit access controls to ensure only trusted administrators have access to the /admin/reservation.php interface. Implement strict input validation and parameterized queries to prevent SQL injection, even if patches are not yet available. Monitor logs for unusual database query patterns or failed login attempts that could indicate exploitation attempts. Employ multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Network segmentation should isolate administrative interfaces from public-facing systems. Regularly back up databases to enable recovery in case of data tampering. Stay alert for official patches or updates from code-projects and apply them promptly once released. Conduct security awareness training for staff to recognize phishing or social engineering attempts that could lead to credential theft. Consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable parameter.
Affected Countries
Spain, Italy, France, Germany, United Kingdom, Portugal, Greece
CVE-2025-12856: SQL Injection in code-projects Responsive Hotel Site
Description
A weakness has been identified in code-projects Responsive Hotel Site 1.0. Impacted is an unknown function of the file /admin/reservation.php. This manipulation of the argument email causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-12856 identifies a SQL injection vulnerability in the Responsive Hotel Site version 1.0 developed by code-projects. The flaw exists in the /admin/reservation.php file, where the email parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This vulnerability can be exploited remotely but requires the attacker to have high-level privileges (authentication) on the system. The injection could lead to unauthorized access or modification of the backend database, potentially exposing sensitive reservation data or altering booking information. The CVSS 4.0 score is 5.1 (medium), reflecting the need for authentication and limited impact on confidentiality, integrity, and availability. No user interaction is required, and the attack complexity is low. Although no active exploitation has been reported, the availability of public exploit code increases the risk of future attacks. The vulnerability does not affect the system's scope beyond the authenticated administrative interface, limiting its reach but still posing a significant risk to affected organizations. No official patches have been released yet, emphasizing the need for immediate mitigations.
Potential Impact
For European organizations, particularly those in the hospitality and tourism sectors using the Responsive Hotel Site 1.0, this vulnerability could lead to unauthorized access to reservation data, manipulation of booking records, and potential leakage of customer information. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Since the vulnerability requires authenticated access, insider threats or compromised credentials pose the greatest risk. The impact on confidentiality is moderate due to potential data exposure, while integrity could be compromised by unauthorized data modifications. Availability impact is limited but possible if attackers manipulate database queries to disrupt service. Given the importance of tourism to many European economies, exploitation could have broader economic consequences, especially in countries with high volumes of hotel bookings and online reservation systems.
Mitigation Recommendations
Organizations should immediately audit access controls to ensure only trusted administrators have access to the /admin/reservation.php interface. Implement strict input validation and parameterized queries to prevent SQL injection, even if patches are not yet available. Monitor logs for unusual database query patterns or failed login attempts that could indicate exploitation attempts. Employ multi-factor authentication (MFA) for administrative accounts to reduce the risk of credential compromise. Network segmentation should isolate administrative interfaces from public-facing systems. Regularly back up databases to enable recovery in case of data tampering. Stay alert for official patches or updates from code-projects and apply them promptly once released. Conduct security awareness training for staff to recognize phishing or social engineering attempts that could lead to credential theft. Consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable parameter.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-07T06:58:04.312Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 690e03b5623ee59e95cb7e44
Added to database: 11/7/2025, 2:35:33 PM
Last enriched: 11/14/2025, 2:40:12 PM
Last updated: 12/22/2025, 5:37:53 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67443: n/a
MediumCVE-2025-10021: CWE-457: Use of Uninitialized Variable in Open Design Alliance ODA Drawings SDK - All Versions < 2026.12
HighCVE-2025-67826: n/a
HighCVE-2025-61740: CWE-346 Origin Validation Error in Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG
HighCVE-2025-26379: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Johnson Controls IQ Panels2, 2+, IQHub, IQPanel 4, PowerG
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.