CVE-2025-13169: SQL Injection in code-projects Simple Online Hotel Reservation System
A security vulnerability has been detected in code-projects Simple Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /add_query_reserve.php. Such manipulation of the argument room_id leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-13169 identifies a SQL injection vulnerability in the Simple Online Hotel Reservation System version 1.0 developed by code-projects. The vulnerability is located in the /add_query_reserve.php script, specifically in the handling of the room_id parameter. Due to insufficient input validation and sanitization, an attacker can remotely inject crafted SQL statements through the room_id argument. This injection flaw allows unauthorized manipulation of SQL queries executed by the application, potentially enabling attackers to read, modify, or delete data within the backend database. The attack vector requires no authentication or user interaction, making it highly accessible to remote adversaries. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no active exploits have been reported yet. The CVSS 4.0 score of 6.9 indicates a medium severity level, reflecting the vulnerability’s moderate impact on confidentiality, integrity, and availability, combined with its ease of exploitation. The lack of scope change means the impact is confined to the vulnerable component without affecting other system components. This vulnerability primarily threatens the integrity and confidentiality of reservation data, potentially leading to data breaches or unauthorized data manipulation. The absence of vendor patches or mitigations at the time of disclosure necessitates immediate defensive measures by users of this software.
Potential Impact
The SQL injection vulnerability in the Simple Online Hotel Reservation System can have significant impacts on organizations relying on this software. Attackers exploiting this flaw can gain unauthorized access to sensitive customer and reservation data, leading to confidentiality breaches. They may also alter or delete reservation records, compromising data integrity and potentially disrupting hotel operations. In some cases, attackers could escalate the attack to execute administrative commands on the database server, affecting availability. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the software is exposed to the internet. Such incidents could result in financial losses, reputational damage, and regulatory penalties for affected organizations. Given the hospitality sector’s reliance on accurate booking data, this vulnerability poses a direct threat to business continuity and customer trust.
Mitigation Recommendations
To mitigate CVE-2025-13169, organizations should immediately implement the following measures: 1) Apply any available patches or updates from the vendor; if none exist, consider upgrading to a more secure reservation system. 2) Implement strict input validation and sanitization on the room_id parameter and all user inputs, ensuring only expected data types and formats are accepted. 3) Refactor the application code to use parameterized queries or prepared statements to prevent direct injection of user input into SQL commands. 4) Employ web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the vulnerable endpoint. 5) Conduct thorough security audits and penetration testing focused on injection flaws. 6) Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 7) Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 8) Educate development teams on secure coding practices to prevent similar vulnerabilities in the future.
Affected Countries
United States, India, United Kingdom, Germany, France, Australia, Canada, United Arab Emirates, Singapore, Thailand
CVE-2025-13169: SQL Injection in code-projects Simple Online Hotel Reservation System
Description
A security vulnerability has been detected in code-projects Simple Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /add_query_reserve.php. Such manipulation of the argument room_id leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13169 identifies a SQL injection vulnerability in the Simple Online Hotel Reservation System version 1.0 developed by code-projects. The vulnerability is located in the /add_query_reserve.php script, specifically in the handling of the room_id parameter. Due to insufficient input validation and sanitization, an attacker can remotely inject crafted SQL statements through the room_id argument. This injection flaw allows unauthorized manipulation of SQL queries executed by the application, potentially enabling attackers to read, modify, or delete data within the backend database. The attack vector requires no authentication or user interaction, making it highly accessible to remote adversaries. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no active exploits have been reported yet. The CVSS 4.0 score of 6.9 indicates a medium severity level, reflecting the vulnerability’s moderate impact on confidentiality, integrity, and availability, combined with its ease of exploitation. The lack of scope change means the impact is confined to the vulnerable component without affecting other system components. This vulnerability primarily threatens the integrity and confidentiality of reservation data, potentially leading to data breaches or unauthorized data manipulation. The absence of vendor patches or mitigations at the time of disclosure necessitates immediate defensive measures by users of this software.
Potential Impact
The SQL injection vulnerability in the Simple Online Hotel Reservation System can have significant impacts on organizations relying on this software. Attackers exploiting this flaw can gain unauthorized access to sensitive customer and reservation data, leading to confidentiality breaches. They may also alter or delete reservation records, compromising data integrity and potentially disrupting hotel operations. In some cases, attackers could escalate the attack to execute administrative commands on the database server, affecting availability. The remote and unauthenticated nature of the exploit increases the risk of widespread attacks, especially if the software is exposed to the internet. Such incidents could result in financial losses, reputational damage, and regulatory penalties for affected organizations. Given the hospitality sector’s reliance on accurate booking data, this vulnerability poses a direct threat to business continuity and customer trust.
Mitigation Recommendations
To mitigate CVE-2025-13169, organizations should immediately implement the following measures: 1) Apply any available patches or updates from the vendor; if none exist, consider upgrading to a more secure reservation system. 2) Implement strict input validation and sanitization on the room_id parameter and all user inputs, ensuring only expected data types and formats are accepted. 3) Refactor the application code to use parameterized queries or prepared statements to prevent direct injection of user input into SQL commands. 4) Employ web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the vulnerable endpoint. 5) Conduct thorough security audits and penetration testing focused on injection flaws. 6) Monitor database logs and application logs for unusual query patterns or errors indicative of injection attempts. 7) Restrict database user privileges to the minimum necessary to limit the impact of a successful injection. 8) Educate development teams on secure coding practices to prevent similar vulnerabilities in the future.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T08:17:01.008Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69174cd17ba9501c4c8e3c33
Added to database: 11/14/2025, 3:37:53 PM
Last enriched: 2/24/2026, 10:20:49 PM
Last updated: 3/24/2026, 4:12:17 AM
Views: 124
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.