CVE-2025-6458: SQL Injection in code-projects Online Hotel Reservation System
A vulnerability has been found in code-projects Online Hotel Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/execedituser.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-6458 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Hotel Reservation System. The vulnerability resides specifically in the /admin/execedituser.php file, where the 'userid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the system's data. Although the CVSS score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically poses a significant risk, especially in administrative modules. The exploit has been publicly disclosed but there are no confirmed reports of active exploitation in the wild at this time. The vulnerability affects only version 1.0 of the product, which is an online hotel reservation platform used to manage bookings, user accounts, and administrative functions. The lack of patches or vendor advisories currently increases the risk for organizations still running this version. Given the administrative context of the vulnerable endpoint, successful exploitation could allow attackers to escalate privileges, extract sensitive customer data, or disrupt reservation services.
Potential Impact
For European organizations, particularly those in the hospitality sector using the affected Online Hotel Reservation System 1.0, this vulnerability could lead to significant operational and reputational damage. Exploitation could result in unauthorized disclosure of personal customer data, including booking details and user credentials, potentially violating GDPR requirements and leading to regulatory penalties. Integrity of reservation data could be compromised, causing booking errors or cancellations, which would disrupt business operations and customer trust. Availability impacts could arise if attackers execute destructive SQL commands, leading to service outages. Given the remote and unauthenticated nature of the exploit, attackers could target multiple organizations en masse, increasing the risk of widespread disruption. The vulnerability also poses a risk to third-party partners and supply chains integrated with the reservation system. Furthermore, the hospitality industry in Europe is a frequent target for cybercriminals due to the volume of personal and payment data processed, amplifying the threat's potential impact.
Mitigation Recommendations
Organizations should immediately assess whether they are running code-projects Online Hotel Reservation System version 1.0 and prioritize upgrading to a patched or newer version if available. In the absence of an official patch, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'userid' parameter in /admin/execedituser.php. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. Restrict access to the /admin directory via network segmentation and IP whitelisting to limit exposure. Employ database least privilege principles, ensuring the database user account used by the application has minimal permissions to reduce potential damage. Enable detailed logging and monitoring for suspicious database query patterns and failed login attempts to detect exploitation attempts early. Regularly back up databases and test restoration procedures to mitigate data loss risks. Finally, educate IT and security teams about this specific vulnerability and monitor threat intelligence feeds for updates or emerging exploits.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden, Austria, Switzerland
CVE-2025-6458: SQL Injection in code-projects Online Hotel Reservation System
Description
A vulnerability has been found in code-projects Online Hotel Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/execedituser.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-6458 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Hotel Reservation System. The vulnerability resides specifically in the /admin/execedituser.php file, where the 'userid' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The injection can lead to unauthorized data access, modification, or deletion, impacting the confidentiality, integrity, and availability of the system's data. Although the CVSS score is 6.9 (medium severity), the nature of SQL injection vulnerabilities typically poses a significant risk, especially in administrative modules. The exploit has been publicly disclosed but there are no confirmed reports of active exploitation in the wild at this time. The vulnerability affects only version 1.0 of the product, which is an online hotel reservation platform used to manage bookings, user accounts, and administrative functions. The lack of patches or vendor advisories currently increases the risk for organizations still running this version. Given the administrative context of the vulnerable endpoint, successful exploitation could allow attackers to escalate privileges, extract sensitive customer data, or disrupt reservation services.
Potential Impact
For European organizations, particularly those in the hospitality sector using the affected Online Hotel Reservation System 1.0, this vulnerability could lead to significant operational and reputational damage. Exploitation could result in unauthorized disclosure of personal customer data, including booking details and user credentials, potentially violating GDPR requirements and leading to regulatory penalties. Integrity of reservation data could be compromised, causing booking errors or cancellations, which would disrupt business operations and customer trust. Availability impacts could arise if attackers execute destructive SQL commands, leading to service outages. Given the remote and unauthenticated nature of the exploit, attackers could target multiple organizations en masse, increasing the risk of widespread disruption. The vulnerability also poses a risk to third-party partners and supply chains integrated with the reservation system. Furthermore, the hospitality industry in Europe is a frequent target for cybercriminals due to the volume of personal and payment data processed, amplifying the threat's potential impact.
Mitigation Recommendations
Organizations should immediately assess whether they are running code-projects Online Hotel Reservation System version 1.0 and prioritize upgrading to a patched or newer version if available. In the absence of an official patch, implement web application firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the 'userid' parameter in /admin/execedituser.php. Conduct thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. Restrict access to the /admin directory via network segmentation and IP whitelisting to limit exposure. Employ database least privilege principles, ensuring the database user account used by the application has minimal permissions to reduce potential damage. Enable detailed logging and monitoring for suspicious database query patterns and failed login attempts to detect exploitation attempts early. Regularly back up databases and test restoration procedures to mitigate data loss risks. Finally, educate IT and security teams about this specific vulnerability and monitor threat intelligence feeds for updates or emerging exploits.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-20T19:33:13.251Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 685787d7179a4edd60b3513f
Added to database: 6/22/2025, 4:34:31 AM
Last enriched: 6/22/2025, 4:49:36 AM
Last updated: 8/17/2025, 5:11:06 AM
Views: 26
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.