CVE-2025-13208: SQL Injection in FantasticLBP Hotels Server
A security flaw has been discovered in FantasticLBP Hotels Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. The impacted element is an unknown function of the file controller/api/hotelList.php. The manipulation of the argument subjectId/cityName results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13208 identifies a SQL injection vulnerability in the FantasticLBP Hotels Server product, specifically within an unknown function in the controller/api/hotelList.php file. The vulnerability is triggered by manipulating the subjectId or cityName parameters, which are not properly sanitized before being used in SQL queries. This allows remote attackers to inject arbitrary SQL commands, potentially extracting or modifying sensitive data stored in the backend database. The attack vector requires no authentication or user interaction, making it easier to exploit remotely. The product follows a rolling release model, complicating version tracking and patch management. Despite early notification, the vendor has not responded or issued a patch, and a public exploit is available, increasing the threat landscape. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation and potential impact on confidentiality, integrity, and availability, though privileges required are low and no user interaction is needed. The vulnerability could be leveraged to access customer data, booking information, or disrupt hotel operations, posing significant risks to organizations relying on this software. The lack of vendor support and patch availability necessitates proactive defensive measures by users.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive customer and booking data, potentially leading to data breaches and violations of GDPR regulations. The integrity of reservation data could be compromised, resulting in fraudulent bookings or cancellations, damaging business operations and reputation. Availability of the Hotels Server could also be affected if attackers exploit the vulnerability to execute destructive SQL commands. Given the public availability of an exploit and absence of vendor patches, attackers may rapidly target vulnerable systems. This is particularly impactful for tourism-dependent economies and hospitality providers in Europe, where customer trust and data protection are critical. Additionally, compromised systems could be used as footholds for broader network intrusion or lateral movement within enterprise environments. The medium severity rating indicates a moderate but tangible risk that requires immediate attention to avoid operational and compliance consequences.
Mitigation Recommendations
Since no official patch or update is available from the vendor, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting subjectId and cityName parameters. Input validation and sanitization should be enforced at the application or proxy level to reject suspicious input patterns. Organizations should conduct thorough code reviews and penetration testing to identify and remediate injection points if source code access is available. Network segmentation can limit attacker movement if exploitation occurs. Monitoring and alerting on unusual database queries or application logs can provide early detection of exploitation attempts. Additionally, organizations should prepare incident response plans specific to this vulnerability and consider temporary disabling or restricting access to the affected API endpoint if feasible. Maintaining regular backups of critical data will aid recovery if data integrity is compromised. Finally, organizations should engage with the vendor for updates and track threat intelligence feeds for emerging exploits or patches.
Affected Countries
France, Spain, Italy, Germany, United Kingdom, Netherlands, Portugal, Greece, Austria, Switzerland
CVE-2025-13208: SQL Injection in FantasticLBP Hotels Server
Description
A security flaw has been discovered in FantasticLBP Hotels Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. The impacted element is an unknown function of the file controller/api/hotelList.php. The manipulation of the argument subjectId/cityName results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13208 identifies a SQL injection vulnerability in the FantasticLBP Hotels Server product, specifically within an unknown function in the controller/api/hotelList.php file. The vulnerability is triggered by manipulating the subjectId or cityName parameters, which are not properly sanitized before being used in SQL queries. This allows remote attackers to inject arbitrary SQL commands, potentially extracting or modifying sensitive data stored in the backend database. The attack vector requires no authentication or user interaction, making it easier to exploit remotely. The product follows a rolling release model, complicating version tracking and patch management. Despite early notification, the vendor has not responded or issued a patch, and a public exploit is available, increasing the threat landscape. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation and potential impact on confidentiality, integrity, and availability, though privileges required are low and no user interaction is needed. The vulnerability could be leveraged to access customer data, booking information, or disrupt hotel operations, posing significant risks to organizations relying on this software. The lack of vendor support and patch availability necessitates proactive defensive measures by users.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive customer and booking data, potentially leading to data breaches and violations of GDPR regulations. The integrity of reservation data could be compromised, resulting in fraudulent bookings or cancellations, damaging business operations and reputation. Availability of the Hotels Server could also be affected if attackers exploit the vulnerability to execute destructive SQL commands. Given the public availability of an exploit and absence of vendor patches, attackers may rapidly target vulnerable systems. This is particularly impactful for tourism-dependent economies and hospitality providers in Europe, where customer trust and data protection are critical. Additionally, compromised systems could be used as footholds for broader network intrusion or lateral movement within enterprise environments. The medium severity rating indicates a moderate but tangible risk that requires immediate attention to avoid operational and compliance consequences.
Mitigation Recommendations
Since no official patch or update is available from the vendor, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting subjectId and cityName parameters. Input validation and sanitization should be enforced at the application or proxy level to reject suspicious input patterns. Organizations should conduct thorough code reviews and penetration testing to identify and remediate injection points if source code access is available. Network segmentation can limit attacker movement if exploitation occurs. Monitoring and alerting on unusual database queries or application logs can provide early detection of exploitation attempts. Additionally, organizations should prepare incident response plans specific to this vulnerability and consider temporary disabling or restricting access to the affected API endpoint if feasible. Maintaining regular backups of critical data will aid recovery if data integrity is compromised. Finally, organizations should engage with the vendor for updates and track threat intelligence feeds for emerging exploits or patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T18:57:26.221Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6918c2a66c45b14c393afde5
Added to database: 11/15/2025, 6:12:54 PM
Last enriched: 11/22/2025, 7:26:10 PM
Last updated: 1/7/2026, 5:24:50 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.