Skip to main content

CVE-2025-6421: SQL Injection in code-projects Simple Online Hotel Reservation System

Medium
VulnerabilityCVE-2025-6421cvecve-2025-6421
Published: Sat Jun 21 2025 (06/21/2025, 22:00:11 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Online Hotel Reservation System

Description

A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/add_account.php. The manipulation of the argument name/admin_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/21/2025, 22:25:29 UTC

Technical Analysis

CVE-2025-6421 is a SQL Injection vulnerability identified in version 1.0 of the Simple Online Hotel Reservation System developed by code-projects. The vulnerability resides in the /admin/add_account.php file, specifically in the handling of the 'name' or 'admin_id' parameters. An attacker can manipulate these input parameters to inject malicious SQL queries. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands on the backend database without requiring any user interaction or privileges. The vulnerability is rated with a CVSS 4.0 score of 6.9 (medium severity), reflecting its ease of exploitation (network accessible, no authentication or user interaction needed) but limited impact on confidentiality, integrity, and availability (low impact on each). The vulnerability has been publicly disclosed, although no known exploits in the wild have been reported yet. Given the nature of the affected system—a hotel reservation platform—successful exploitation could lead to unauthorized access to sensitive customer data, manipulation or deletion of reservation records, and potential disruption of booking services. The lack of authentication requirements and remote attack vector increase the risk profile, especially for organizations using this software without proper compensating controls or patches. However, the absence of a patch or vendor-provided fix at this time increases exposure for affected deployments. The vulnerability's impact is constrained by the limited market penetration of this specific software and the scope of affected versions (only version 1.0).

Potential Impact

For European organizations, the impact of this vulnerability could be significant in the hospitality sector, particularly for small to medium-sized hotels or chains relying on the Simple Online Hotel Reservation System version 1.0. Exploitation could lead to unauthorized disclosure of personal identifiable information (PII) of guests, including names, contact details, and booking histories, which would violate GDPR regulations and potentially result in heavy fines and reputational damage. Additionally, attackers could alter or delete reservation data, causing operational disruptions and financial losses. The integrity of booking data is critical for customer trust and business continuity. Since the vulnerability allows remote exploitation without authentication, attackers could automate attacks at scale, increasing the risk of widespread compromise. However, the overall impact is somewhat mitigated by the limited adoption of this specific software product in Europe, and the absence of known active exploitation campaigns. Nonetheless, organizations using this system should consider the threat serious due to the critical nature of the data handled and regulatory implications.

Mitigation Recommendations

Immediately audit all deployments of Simple Online Hotel Reservation System version 1.0 to identify affected instances. Implement Web Application Firewall (WAF) rules specifically targeting SQL injection patterns on the /admin/add_account.php endpoint, focusing on the 'name' and 'admin_id' parameters. Restrict network access to the administration interface to trusted IP addresses or VPN-only access to reduce exposure to remote attacks. Apply input validation and parameterized queries or prepared statements in the source code to sanitize user inputs and prevent SQL injection; if source code modification is not feasible, consider isolating the vulnerable component or replacing the software. Monitor database logs and application logs for unusual query patterns or failed login attempts that may indicate exploitation attempts. Establish regular backups of the database to enable recovery in case of data tampering or deletion. Engage with the vendor or community to obtain or develop patches or updated versions addressing this vulnerability. Conduct security awareness training for administrators to recognize and respond to suspicious activities related to the reservation system.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-20T10:56:08.144Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68572dd156b83d086c5ce13f

Added to database: 6/21/2025, 10:10:25 PM

Last enriched: 6/21/2025, 10:25:29 PM

Last updated: 8/11/2025, 8:44:31 PM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats