CVE-2025-13169: SQL Injection in code-projects Simple Online Hotel Reservation System
A security vulnerability has been detected in code-projects Simple Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /add_query_reserve.php. Such manipulation of the argument room_id leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-13169 is a SQL Injection vulnerability identified in the Simple Online Hotel Reservation System version 1.0 developed by code-projects. The vulnerability exists in the /add_query_reserve.php script, where the room_id parameter is not properly sanitized or validated before being incorporated into SQL queries. This lack of input validation allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the backend database. Such injection can lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality, integrity, and availability of reservation and customer data. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely. Although no public exploits have been reported in the wild yet, the vulnerability has been publicly disclosed, which increases the risk of exploitation by threat actors. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). This suggests that the vulnerability can be exploited remotely with relative ease and can cause moderate damage to the affected systems. The Simple Online Hotel Reservation System is typically used by small to medium-sized hospitality businesses to manage bookings online, making the data stored within it sensitive and critical for business operations. The absence of patches or official fixes at the time of disclosure necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer information such as personal details and booking histories, potentially violating GDPR regulations and resulting in legal and financial penalties. Data integrity could be compromised, leading to incorrect booking information, double bookings, or cancellations, which would disrupt business operations and damage customer trust. Availability impacts could arise if attackers manipulate or delete reservation data, causing service outages or operational delays. Since the vulnerability can be exploited remotely without authentication, attackers from anywhere could target affected systems, increasing the threat landscape. The medium severity rating reflects a balance between the ease of exploitation and the potential damage, but the impact on customer data privacy and business continuity in the European hospitality market could be substantial. Organizations failing to address this vulnerability risk reputational damage and financial losses due to service disruption and regulatory non-compliance.
Mitigation Recommendations
Immediate mitigation should focus on input validation and sanitization of the room_id parameter in /add_query_reserve.php. Developers should refactor the code to use parameterized queries or prepared statements to prevent SQL injection. Until a patch is available, organizations should implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Regularly monitor web server logs for suspicious activity related to /add_query_reserve.php and the room_id parameter. Conduct thorough code audits of the entire application to identify and remediate similar vulnerabilities. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. Additionally, organizations should ensure that backups of reservation data are current and tested for restoration to mitigate potential data loss. Finally, maintain awareness of any official patches or updates from the vendor and apply them promptly once released.
Affected Countries
Spain, Italy, France, Germany, United Kingdom
CVE-2025-13169: SQL Injection in code-projects Simple Online Hotel Reservation System
Description
A security vulnerability has been detected in code-projects Simple Online Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /add_query_reserve.php. Such manipulation of the argument room_id leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-13169 is a SQL Injection vulnerability identified in the Simple Online Hotel Reservation System version 1.0 developed by code-projects. The vulnerability exists in the /add_query_reserve.php script, where the room_id parameter is not properly sanitized or validated before being incorporated into SQL queries. This lack of input validation allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the backend database. Such injection can lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality, integrity, and availability of reservation and customer data. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely. Although no public exploits have been reported in the wild yet, the vulnerability has been publicly disclosed, which increases the risk of exploitation by threat actors. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). This suggests that the vulnerability can be exploited remotely with relative ease and can cause moderate damage to the affected systems. The Simple Online Hotel Reservation System is typically used by small to medium-sized hospitality businesses to manage bookings online, making the data stored within it sensitive and critical for business operations. The absence of patches or official fixes at the time of disclosure necessitates immediate mitigation steps by administrators.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer information such as personal details and booking histories, potentially violating GDPR regulations and resulting in legal and financial penalties. Data integrity could be compromised, leading to incorrect booking information, double bookings, or cancellations, which would disrupt business operations and damage customer trust. Availability impacts could arise if attackers manipulate or delete reservation data, causing service outages or operational delays. Since the vulnerability can be exploited remotely without authentication, attackers from anywhere could target affected systems, increasing the threat landscape. The medium severity rating reflects a balance between the ease of exploitation and the potential damage, but the impact on customer data privacy and business continuity in the European hospitality market could be substantial. Organizations failing to address this vulnerability risk reputational damage and financial losses due to service disruption and regulatory non-compliance.
Mitigation Recommendations
Immediate mitigation should focus on input validation and sanitization of the room_id parameter in /add_query_reserve.php. Developers should refactor the code to use parameterized queries or prepared statements to prevent SQL injection. Until a patch is available, organizations should implement Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter. Regularly monitor web server logs for suspicious activity related to /add_query_reserve.php and the room_id parameter. Conduct thorough code audits of the entire application to identify and remediate similar vulnerabilities. Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. Additionally, organizations should ensure that backups of reservation data are current and tested for restoration to mitigate potential data loss. Finally, maintain awareness of any official patches or updates from the vendor and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T08:17:01.008Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69174cd17ba9501c4c8e3c33
Added to database: 11/14/2025, 3:37:53 PM
Last enriched: 11/14/2025, 3:45:01 PM
Last updated: 11/15/2025, 6:00:33 PM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13203: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-13202: Cross Site Scripting in code-projects Simple Cafe Ordering System
MediumCVE-2025-13201: SQL Injection in code-projects Simple Cafe Ordering System
MediumCyberRecon project
MediumCVE-2025-13200: Exposure of Information Through Directory Listing in SourceCodester Farm Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.