Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13208: SQL Injection in FantasticLBP Hotels Server

0
Medium
VulnerabilityCVE-2025-13208cvecve-2025-13208
Published: Sat Nov 15 2025 (11/15/2025, 18:02:07 UTC)
Source: CVE Database V5
Vendor/Project: FantasticLBP
Product: Hotels Server

Description

A security flaw has been discovered in FantasticLBP Hotels Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. The impacted element is an unknown function of the file controller/api/hotelList.php. The manipulation of the argument subjectId/cityName results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/22/2025, 19:26:10 UTC

Technical Analysis

CVE-2025-13208 identifies a SQL injection vulnerability in the FantasticLBP Hotels Server product, specifically within an unknown function in the controller/api/hotelList.php file. The vulnerability is triggered by manipulating the subjectId or cityName parameters, which are not properly sanitized before being used in SQL queries. This allows remote attackers to inject arbitrary SQL commands, potentially extracting or modifying sensitive data stored in the backend database. The attack vector requires no authentication or user interaction, making it easier to exploit remotely. The product follows a rolling release model, complicating version tracking and patch management. Despite early notification, the vendor has not responded or issued a patch, and a public exploit is available, increasing the threat landscape. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation and potential impact on confidentiality, integrity, and availability, though privileges required are low and no user interaction is needed. The vulnerability could be leveraged to access customer data, booking information, or disrupt hotel operations, posing significant risks to organizations relying on this software. The lack of vendor support and patch availability necessitates proactive defensive measures by users.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to sensitive customer and booking data, potentially leading to data breaches and violations of GDPR regulations. The integrity of reservation data could be compromised, resulting in fraudulent bookings or cancellations, damaging business operations and reputation. Availability of the Hotels Server could also be affected if attackers exploit the vulnerability to execute destructive SQL commands. Given the public availability of an exploit and absence of vendor patches, attackers may rapidly target vulnerable systems. This is particularly impactful for tourism-dependent economies and hospitality providers in Europe, where customer trust and data protection are critical. Additionally, compromised systems could be used as footholds for broader network intrusion or lateral movement within enterprise environments. The medium severity rating indicates a moderate but tangible risk that requires immediate attention to avoid operational and compliance consequences.

Mitigation Recommendations

Since no official patch or update is available from the vendor, European organizations should implement immediate compensating controls. These include deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting subjectId and cityName parameters. Input validation and sanitization should be enforced at the application or proxy level to reject suspicious input patterns. Organizations should conduct thorough code reviews and penetration testing to identify and remediate injection points if source code access is available. Network segmentation can limit attacker movement if exploitation occurs. Monitoring and alerting on unusual database queries or application logs can provide early detection of exploitation attempts. Additionally, organizations should prepare incident response plans specific to this vulnerability and consider temporary disabling or restricting access to the affected API endpoint if feasible. Maintaining regular backups of critical data will aid recovery if data integrity is compromised. Finally, organizations should engage with the vendor for updates and track threat intelligence feeds for emerging exploits or patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T18:57:26.221Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6918c2a66c45b14c393afde5

Added to database: 11/15/2025, 6:12:54 PM

Last enriched: 11/22/2025, 7:26:10 PM

Last updated: 1/7/2026, 5:24:50 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats