Skip to main content

CVE-2025-6458: SQL Injection in code-projects Online Hotel Reservation System

Medium
VulnerabilityCVE-2025-6458cvecve-2025-6458
Published: Sun Jun 22 2025 (06/22/2025, 04:31:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Hotel Reservation System

Description

A vulnerability has been found in code-projects Online Hotel Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/execedituser.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/22/2025, 04:49:36 UTC

Technical Analysis

CVE-2025-6458 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Hotel Reservation System. The vulnerability resides specifically in the /admin/execedituser.php file, where the 'userid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the system's data. Although the CVSS score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically poses a significant risk, especially in administrative modules. The exploit has been publicly disclosed but there are no confirmed reports of active exploitation in the wild at this time. The vulnerability affects only version 1.0 of the product, which is an online hotel reservation platform used to manage bookings, user accounts, and administrative functions. The lack of patches or vendor advisories currently increases the risk for organizations still running this version. Given the administrative context of the vulnerable endpoint, successful exploitation could allow attackers to escalate privileges, extract sensitive customer data, or disrupt reservation services.

Potential Impact

For European organizations, particularly those in the hospitality sector using the affected Online Hotel Reservation System 1.0, this vulnerability could lead to significant operational and reputational damage. Exploitation could result in unauthorized disclosure of personal customer data, including booking details and user credentials, potentially violating GDPR requirements and leading to regulatory penalties. Integrity of reservation data could be compromised, causing booking errors or cancellations, which would disrupt business operations and customer trust. Availability impacts could arise if attackers execute destructive SQL commands, leading to service outages. Given the remote and unauthenticated nature of the exploit, attackers could target multiple organizations en masse, increasing the risk of widespread disruption. The vulnerability also poses a risk to third-party partners and supply chains integrated with the reservation system. Furthermore, the hospitality industry in Europe is a frequent target for cybercriminals due to the volume of personal and payment data processed, amplifying the threat's potential impact.

Mitigation Recommendations

Organizations should immediately assess whether they are running code-projects Online Hotel Reservation System version 1.0 and prioritize upgrading to a patched or newer version if available. In the absence of an official patch, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'userid' parameter in /admin/execedituser.php. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. Restrict access to the /admin directory via network segmentation and IP whitelisting to limit exposure. Employ database least privilege principles, ensuring the database user account used by the application has minimal permissions to reduce potential damage. Enable detailed logging and monitoring for suspicious database query patterns and failed login attempts to detect exploitation attempts early. Regularly back up databases and test restoration procedures to mitigate data loss risks. Finally, educate IT and security teams about this specific vulnerability and monitor threat intelligence feeds for updates or emerging exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-20T19:33:13.251Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685787d7179a4edd60b3513f

Added to database: 6/22/2025, 4:34:31 AM

Last enriched: 6/22/2025, 4:49:36 AM

Last updated: 8/17/2025, 5:11:06 AM

Views: 26

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats