CVE-2025-13075: SQL Injection in code-projects Responsive Hotel Site
A vulnerability was detected in code-projects Responsive Hotel Site 1.0. Impacted is an unknown function of the file /admin/usersettingdel.php. Performing manipulation of the argument eid results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2025-13075 is a SQL injection vulnerability identified in the Responsive Hotel Site version 1.0 developed by code-projects. The vulnerability resides in the /admin/usersettingdel.php file, where the 'eid' parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend database queries, potentially extracting, modifying, or deleting sensitive data. The vulnerability does not require user interaction but does require the attacker to have high privileges (PR:H), indicating that some level of authentication or elevated access is necessary before exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit code has been made public, increasing the risk of exploitation, although no active widespread attacks have been reported. The vulnerability affects a niche web application used primarily in the hospitality industry for hotel management, which may limit the scope but also targets sensitive customer and operational data. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, especially those in the hospitality sector using the Responsive Hotel Site 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and operational data. Exploitation could lead to data leakage, unauthorized data modification, or deletion, impacting business operations and customer trust. Given the administrative nature of the vulnerable endpoint, attackers with elevated privileges could leverage this flaw to escalate their access or disrupt services. This could result in regulatory non-compliance issues under GDPR due to potential exposure of personal data. The public availability of exploit code increases the likelihood of targeted attacks, particularly against smaller hotels or chains that may lack robust cybersecurity defenses. The medium severity rating suggests a moderate but tangible threat that requires timely attention to prevent exploitation and potential reputational damage.
Mitigation Recommendations
1. Immediately restrict access to the /admin/usersettingdel.php endpoint to trusted IP addresses or VPN users to reduce exposure. 2. Implement strict input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. 3. Monitor web server and application logs for suspicious activities targeting the 'eid' parameter or admin endpoints. 4. Apply any vendor-provided patches or updates as soon as they become available. 5. Conduct a thorough security review of the entire application to identify and remediate other potential injection points. 6. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this vulnerability. 7. Educate administrative users on secure credential management and monitor for unusual login patterns that could indicate compromised accounts. 8. Regularly back up databases and test restoration procedures to minimize impact in case of data tampering or loss.
Affected Countries
Spain, Italy, France, Germany, United Kingdom, Netherlands
CVE-2025-13075: SQL Injection in code-projects Responsive Hotel Site
Description
A vulnerability was detected in code-projects Responsive Hotel Site 1.0. Impacted is an unknown function of the file /admin/usersettingdel.php. Performing manipulation of the argument eid results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13075 is a SQL injection vulnerability identified in the Responsive Hotel Site version 1.0 developed by code-projects. The vulnerability resides in the /admin/usersettingdel.php file, where the 'eid' parameter is improperly sanitized, allowing attackers to inject malicious SQL code. This injection flaw enables remote attackers to manipulate backend database queries, potentially extracting, modifying, or deleting sensitive data. The vulnerability does not require user interaction but does require the attacker to have high privileges (PR:H), indicating that some level of authentication or elevated access is necessary before exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit code has been made public, increasing the risk of exploitation, although no active widespread attacks have been reported. The vulnerability affects a niche web application used primarily in the hospitality industry for hotel management, which may limit the scope but also targets sensitive customer and operational data. The lack of available patches at the time of publication necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, especially those in the hospitality sector using the Responsive Hotel Site 1.0, this vulnerability poses a risk of unauthorized access to sensitive customer and operational data. Exploitation could lead to data leakage, unauthorized data modification, or deletion, impacting business operations and customer trust. Given the administrative nature of the vulnerable endpoint, attackers with elevated privileges could leverage this flaw to escalate their access or disrupt services. This could result in regulatory non-compliance issues under GDPR due to potential exposure of personal data. The public availability of exploit code increases the likelihood of targeted attacks, particularly against smaller hotels or chains that may lack robust cybersecurity defenses. The medium severity rating suggests a moderate but tangible threat that requires timely attention to prevent exploitation and potential reputational damage.
Mitigation Recommendations
1. Immediately restrict access to the /admin/usersettingdel.php endpoint to trusted IP addresses or VPN users to reduce exposure. 2. Implement strict input validation and parameterized queries or prepared statements in the application code to prevent SQL injection. 3. Monitor web server and application logs for suspicious activities targeting the 'eid' parameter or admin endpoints. 4. Apply any vendor-provided patches or updates as soon as they become available. 5. Conduct a thorough security review of the entire application to identify and remediate other potential injection points. 6. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this vulnerability. 7. Educate administrative users on secure credential management and monitor for unusual login patterns that could indicate compromised accounts. 8. Regularly back up databases and test restoration procedures to minimize impact in case of data tampering or loss.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-12T15:42:57.521Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69150e3812715e9af456ea49
Added to database: 11/12/2025, 10:46:16 PM
Last enriched: 11/19/2025, 11:17:13 PM
Last updated: 12/28/2025, 6:54:36 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15124: Improper Authorization in JeecgBoot
LowCVE-2025-15123: Improper Authorization in JeecgBoot
LowCVE-2025-15122: Improper Authorization in JeecgBoot
LowCVE-2025-15121: Information Disclosure in JeecgBoot
MediumCVE-2025-15120: Improper Authorization in JeecgBoot
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.