CVE-2025-14711: SQL Injection in FantasticLBP Hotels Server
CVE-2025-14711 is a medium-severity SQL injection vulnerability found in the FantasticLBP Hotels Server, specifically in the /controller/api/hotelList. php endpoint. The flaw arises from improper sanitization of the 'pickedHotelName/type' argument, allowing remote attackers to inject malicious SQL queries without authentication or user interaction. Although no known exploits are currently active in the wild, a public exploit has been published, increasing the risk of exploitation. The vendor has not responded to disclosure attempts, and no patches are available. This vulnerability could lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of hotel booking data. European organizations using this software, especially in countries with significant tourism and hospitality sectors, are at risk. Mitigation requires immediate implementation of input validation, use of parameterized queries, and network-level protections. Countries like Spain, Italy, France, Germany, and the UK are most likely affected due to their market penetration and strategic importance in hospitality services.
AI Analysis
Technical Summary
CVE-2025-14711 is a SQL injection vulnerability identified in the FantasticLBP Hotels Server product, affecting versions up to commit 67b44df162fab26df209bd5d5d542875fcbec1d0. The vulnerability exists in the /controller/api/hotelList.php file, where the 'pickedHotelName/type' parameter is improperly sanitized, allowing attackers to inject arbitrary SQL commands. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with network attack vector, low complexity, and no privileges or user interaction needed. The impact includes potential unauthorized disclosure, modification, or deletion of sensitive hotel booking data stored in the backend database. The vendor follows a rolling release strategy but has not responded to early disclosure attempts, and no official patches or mitigations have been released. The presence of a publicly available exploit increases the likelihood of exploitation, although no active exploitation has been reported yet. The vulnerability affects the confidentiality, integrity, and availability of the system, posing risks to both service providers and their customers.
Potential Impact
For European organizations, particularly those in the hospitality and travel sectors using FantasticLBP Hotels Server, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive customer data, including personal identification and booking details, resulting in privacy breaches and regulatory non-compliance under GDPR. Data integrity could be compromised, allowing attackers to alter booking information or disrupt service availability, potentially causing operational downtime and reputational damage. The remote and unauthenticated nature of the attack vector increases the threat surface, making it easier for cybercriminals to target multiple organizations simultaneously. Given the strategic importance of tourism in countries like Spain, Italy, France, Germany, and the UK, successful exploitation could have broader economic impacts. Additionally, the lack of vendor response and absence of patches heighten the urgency for organizations to implement their own mitigations to prevent exploitation.
Mitigation Recommendations
Organizations should immediately implement strict input validation and sanitization on all user-supplied data, especially the 'pickedHotelName/type' parameter, to prevent SQL injection. Refactoring the affected code to use parameterized queries or prepared statements is critical to eliminate injection vectors. Network-level protections such as Web Application Firewalls (WAFs) should be deployed and configured to detect and block SQL injection attempts targeting the vulnerable endpoint. Regular security audits and code reviews should be conducted to identify and remediate similar vulnerabilities. Monitoring and logging of API access should be enhanced to detect suspicious activities promptly. In the absence of vendor patches, organizations should consider isolating the affected service or restricting access to trusted networks until a fix is available. Additionally, organizations must ensure compliance with GDPR by protecting customer data and preparing incident response plans for potential data breaches related to this vulnerability.
Affected Countries
Spain, Italy, France, Germany, United Kingdom
CVE-2025-14711: SQL Injection in FantasticLBP Hotels Server
Description
CVE-2025-14711 is a medium-severity SQL injection vulnerability found in the FantasticLBP Hotels Server, specifically in the /controller/api/hotelList. php endpoint. The flaw arises from improper sanitization of the 'pickedHotelName/type' argument, allowing remote attackers to inject malicious SQL queries without authentication or user interaction. Although no known exploits are currently active in the wild, a public exploit has been published, increasing the risk of exploitation. The vendor has not responded to disclosure attempts, and no patches are available. This vulnerability could lead to unauthorized data access, modification, or deletion, impacting confidentiality, integrity, and availability of hotel booking data. European organizations using this software, especially in countries with significant tourism and hospitality sectors, are at risk. Mitigation requires immediate implementation of input validation, use of parameterized queries, and network-level protections. Countries like Spain, Italy, France, Germany, and the UK are most likely affected due to their market penetration and strategic importance in hospitality services.
AI-Powered Analysis
Technical Analysis
CVE-2025-14711 is a SQL injection vulnerability identified in the FantasticLBP Hotels Server product, affecting versions up to commit 67b44df162fab26df209bd5d5d542875fcbec1d0. The vulnerability exists in the /controller/api/hotelList.php file, where the 'pickedHotelName/type' parameter is improperly sanitized, allowing attackers to inject arbitrary SQL commands. This injection flaw can be exploited remotely without requiring authentication or user interaction, making it highly accessible to attackers. The vulnerability has a CVSS 4.0 base score of 6.9, indicating medium severity, with network attack vector, low complexity, and no privileges or user interaction needed. The impact includes potential unauthorized disclosure, modification, or deletion of sensitive hotel booking data stored in the backend database. The vendor follows a rolling release strategy but has not responded to early disclosure attempts, and no official patches or mitigations have been released. The presence of a publicly available exploit increases the likelihood of exploitation, although no active exploitation has been reported yet. The vulnerability affects the confidentiality, integrity, and availability of the system, posing risks to both service providers and their customers.
Potential Impact
For European organizations, particularly those in the hospitality and travel sectors using FantasticLBP Hotels Server, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive customer data, including personal identification and booking details, resulting in privacy breaches and regulatory non-compliance under GDPR. Data integrity could be compromised, allowing attackers to alter booking information or disrupt service availability, potentially causing operational downtime and reputational damage. The remote and unauthenticated nature of the attack vector increases the threat surface, making it easier for cybercriminals to target multiple organizations simultaneously. Given the strategic importance of tourism in countries like Spain, Italy, France, Germany, and the UK, successful exploitation could have broader economic impacts. Additionally, the lack of vendor response and absence of patches heighten the urgency for organizations to implement their own mitigations to prevent exploitation.
Mitigation Recommendations
Organizations should immediately implement strict input validation and sanitization on all user-supplied data, especially the 'pickedHotelName/type' parameter, to prevent SQL injection. Refactoring the affected code to use parameterized queries or prepared statements is critical to eliminate injection vectors. Network-level protections such as Web Application Firewalls (WAFs) should be deployed and configured to detect and block SQL injection attempts targeting the vulnerable endpoint. Regular security audits and code reviews should be conducted to identify and remediate similar vulnerabilities. Monitoring and logging of API access should be enhanced to detect suspicious activities promptly. In the absence of vendor patches, organizations should consider isolating the affected service or restricting access to trusted networks until a fix is available. Additionally, organizations must ensure compliance with GDPR by protecting customer data and preparing incident response plans for potential data breaches related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-14T20:07:17.249Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693fc3c1d9bcdf3f3dc24d4e
Added to database: 12/15/2025, 8:16:01 AM
Last enriched: 12/15/2025, 8:30:15 AM
Last updated: 12/15/2025, 10:41:22 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
700Credit Data Breach Impacts 5.8 Million Individuals
MediumCVE-2025-14710: SQL Injection in FantasticLBP Hotels Server
MediumCVE-2025-14709: Buffer Overflow in Shiguangwu sgwbox N3
CriticalCVE-2025-14023: na in LINE Corporation LINE client for iOS
LowCVE-2025-14022: na in LINE Corporation LINE client for iOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.