CVE-2025-15127: SQL Injection in FantasticLBP Hotels_Server
A security vulnerability has been detected in FantasticLBP Hotels_Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. Affected by this issue is some unknown functionality of the file /controller/api/Room.php. Such manipulation of the argument hotelId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15127 identifies a SQL injection vulnerability in the FantasticLBP Hotels_Server product, specifically within the /controller/api/Room.php endpoint. The vulnerability arises due to insufficient sanitization of the hotelId parameter, allowing attackers to inject malicious SQL code remotely without authentication or user interaction. This injection can manipulate backend database queries, potentially exposing sensitive hotel booking data, customer information, or enabling unauthorized data modification and deletion. The product operates on a rolling release model, complicating version tracking and patch management, and the vendor has not issued any response or patch following early disclosure. The vulnerability has been publicly disclosed, increasing the risk of exploitation despite no current known active exploits. The CVSS 4.0 vector indicates a network-based attack with low complexity and no required privileges, impacting confidentiality, integrity, and availability to a limited extent. This vulnerability is critical for organizations relying on FantasticLBP Hotels_Server for managing hotel room bookings and related services, as exploitation could lead to data breaches, service interruptions, or reputational damage. The lack of vendor response necessitates immediate defensive measures by users of the software.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those in the hospitality and travel sectors using FantasticLBP Hotels_Server. Exploitation could lead to unauthorized access to sensitive customer data such as personal identification, booking details, and payment information, violating GDPR and other data protection regulations. Integrity of booking data could be compromised, leading to fraudulent bookings or cancellations, disrupting business operations and customer trust. Availability impacts, while limited, could still result in service outages or degraded performance if attackers execute denial-of-service style SQL queries. The public disclosure and absence of vendor patches increase the urgency for European entities to implement mitigations to avoid potential regulatory penalties, financial losses, and reputational harm. Additionally, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement within affected organizations.
Mitigation Recommendations
Given the lack of vendor patches, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the hotelId parameter at the application or web server level to prevent malicious SQL payloads. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint. Conduct thorough code reviews and consider temporary disabling or restricting access to the /controller/api/Room.php API if feasible. Monitor database logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. Employ database-level protections such as least privilege access controls and query parameterization where possible. Organizations should also prepare incident response plans specific to SQL injection attacks and maintain up-to-date backups to enable recovery from potential data tampering. Engage with the vendor continuously for updates and consider alternative software solutions if the vendor remains unresponsive.
Affected Countries
France, Germany, Spain, Italy, United Kingdom, Netherlands, Switzerland, Austria
CVE-2025-15127: SQL Injection in FantasticLBP Hotels_Server
Description
A security vulnerability has been detected in FantasticLBP Hotels_Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. Affected by this issue is some unknown functionality of the file /controller/api/Room.php. Such manipulation of the argument hotelId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15127 identifies a SQL injection vulnerability in the FantasticLBP Hotels_Server product, specifically within the /controller/api/Room.php endpoint. The vulnerability arises due to insufficient sanitization of the hotelId parameter, allowing attackers to inject malicious SQL code remotely without authentication or user interaction. This injection can manipulate backend database queries, potentially exposing sensitive hotel booking data, customer information, or enabling unauthorized data modification and deletion. The product operates on a rolling release model, complicating version tracking and patch management, and the vendor has not issued any response or patch following early disclosure. The vulnerability has been publicly disclosed, increasing the risk of exploitation despite no current known active exploits. The CVSS 4.0 vector indicates a network-based attack with low complexity and no required privileges, impacting confidentiality, integrity, and availability to a limited extent. This vulnerability is critical for organizations relying on FantasticLBP Hotels_Server for managing hotel room bookings and related services, as exploitation could lead to data breaches, service interruptions, or reputational damage. The lack of vendor response necessitates immediate defensive measures by users of the software.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those in the hospitality and travel sectors using FantasticLBP Hotels_Server. Exploitation could lead to unauthorized access to sensitive customer data such as personal identification, booking details, and payment information, violating GDPR and other data protection regulations. Integrity of booking data could be compromised, leading to fraudulent bookings or cancellations, disrupting business operations and customer trust. Availability impacts, while limited, could still result in service outages or degraded performance if attackers execute denial-of-service style SQL queries. The public disclosure and absence of vendor patches increase the urgency for European entities to implement mitigations to avoid potential regulatory penalties, financial losses, and reputational harm. Additionally, attackers could leverage this vulnerability as a foothold for further network intrusion or lateral movement within affected organizations.
Mitigation Recommendations
Given the lack of vendor patches, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on the hotelId parameter at the application or web server level to prevent malicious SQL payloads. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoint. Conduct thorough code reviews and consider temporary disabling or restricting access to the /controller/api/Room.php API if feasible. Monitor database logs and network traffic for unusual queries or access patterns indicative of exploitation attempts. Employ database-level protections such as least privilege access controls and query parameterization where possible. Organizations should also prepare incident response plans specific to SQL injection attacks and maintain up-to-date backups to enable recovery from potential data tampering. Engage with the vendor continuously for updates and consider alternative software solutions if the vendor remains unresponsive.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T09:03:53.113Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450bbdb813ff03e2bf83c
Added to database: 12/30/2025, 10:22:51 PM
Last enriched: 12/30/2025, 11:43:41 PM
Last updated: 2/5/2026, 4:47:45 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61732: CWE-94: Improper Control of Generation of Code ('Code Injection') in Go toolchain cmd/cgo
HighCVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.