CVE-2025-66078: Improper Control of Generation of Code ('Code Injection') in jetmonsters Hotel Booking Lite
Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters Hotel Booking Lite motopress-hotel-booking-lite allows Remote Code Inclusion.This issue affects Hotel Booking Lite: from n/a through <= 5.2.3.
AI Analysis
Technical Summary
CVE-2025-66078 is a critical security vulnerability classified as 'Improper Control of Generation of Code' or code injection in the jetmonsters Hotel Booking Lite plugin, versions up to 5.2.3. This plugin is widely used on WordPress websites to manage hotel bookings and reservations. The vulnerability allows remote attackers to perform Remote Code Inclusion (RCI), meaning they can inject malicious code that the server will execute. The CVSS 3.1 base score of 9.1 indicates a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). Because no authentication or user interaction is needed, exploitation can be automated and widespread. The vulnerability arises from insufficient validation or sanitization of user-supplied input that is used in code generation or inclusion, allowing attackers to inject arbitrary code remotely. This can lead to full compromise of the affected web server, data theft, defacement, or pivoting into internal networks. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make it a high-risk threat. The vulnerability was reserved on 2025-11-21 and published on 2025-12-18, with no patches currently linked, indicating a potential zero-day window. Organizations using this plugin must prioritize mitigation to prevent exploitation.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors relying on the jetmonsters Hotel Booking Lite plugin, this vulnerability poses a severe risk. Exploitation can lead to unauthorized access to sensitive customer data such as personal identification, payment details, and booking information, violating GDPR and other data protection regulations. The integrity of booking systems can be compromised, resulting in fraudulent bookings or service disruptions. Although availability is not directly impacted, the reputational damage and regulatory penalties from data breaches can be substantial. Attackers could also use compromised servers as footholds for further attacks within corporate networks. Given the critical CVSS score and ease of exploitation, the threat could lead to widespread incidents if not addressed promptly. European organizations with online booking platforms are prime targets due to the high value of hospitality data and the prevalence of WordPress-based solutions.
Mitigation Recommendations
Immediate mitigation steps include: 1) Monitoring the vendor's official channels for patches and applying them as soon as they are released. 2) Temporarily disabling or removing the Hotel Booking Lite plugin if patching is not yet available. 3) Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads indicative of code injection attempts targeting this plugin. 4) Conducting thorough input validation and sanitization on all user inputs related to booking forms and plugin endpoints. 5) Restricting access to plugin-related endpoints via IP whitelisting or authentication where possible. 6) Performing regular security audits and penetration testing focused on WordPress plugins. 7) Ensuring backups are up to date and tested for restoration to recover quickly from potential compromises. 8) Educating IT and security teams about the vulnerability to recognize signs of exploitation. These measures go beyond generic advice by focusing on plugin-specific controls and proactive monitoring.
Affected Countries
Spain, Italy, France, Germany, United Kingdom, Netherlands, Portugal, Greece
CVE-2025-66078: Improper Control of Generation of Code ('Code Injection') in jetmonsters Hotel Booking Lite
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters Hotel Booking Lite motopress-hotel-booking-lite allows Remote Code Inclusion.This issue affects Hotel Booking Lite: from n/a through <= 5.2.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-66078 is a critical security vulnerability classified as 'Improper Control of Generation of Code' or code injection in the jetmonsters Hotel Booking Lite plugin, versions up to 5.2.3. This plugin is widely used on WordPress websites to manage hotel bookings and reservations. The vulnerability allows remote attackers to perform Remote Code Inclusion (RCI), meaning they can inject malicious code that the server will execute. The CVSS 3.1 base score of 9.1 indicates a critical severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). Because no authentication or user interaction is needed, exploitation can be automated and widespread. The vulnerability arises from insufficient validation or sanitization of user-supplied input that is used in code generation or inclusion, allowing attackers to inject arbitrary code remotely. This can lead to full compromise of the affected web server, data theft, defacement, or pivoting into internal networks. Although no known exploits are currently reported in the wild, the critical nature and ease of exploitation make it a high-risk threat. The vulnerability was reserved on 2025-11-21 and published on 2025-12-18, with no patches currently linked, indicating a potential zero-day window. Organizations using this plugin must prioritize mitigation to prevent exploitation.
Potential Impact
For European organizations, especially those in the hospitality and tourism sectors relying on the jetmonsters Hotel Booking Lite plugin, this vulnerability poses a severe risk. Exploitation can lead to unauthorized access to sensitive customer data such as personal identification, payment details, and booking information, violating GDPR and other data protection regulations. The integrity of booking systems can be compromised, resulting in fraudulent bookings or service disruptions. Although availability is not directly impacted, the reputational damage and regulatory penalties from data breaches can be substantial. Attackers could also use compromised servers as footholds for further attacks within corporate networks. Given the critical CVSS score and ease of exploitation, the threat could lead to widespread incidents if not addressed promptly. European organizations with online booking platforms are prime targets due to the high value of hospitality data and the prevalence of WordPress-based solutions.
Mitigation Recommendations
Immediate mitigation steps include: 1) Monitoring the vendor's official channels for patches and applying them as soon as they are released. 2) Temporarily disabling or removing the Hotel Booking Lite plugin if patching is not yet available. 3) Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads indicative of code injection attempts targeting this plugin. 4) Conducting thorough input validation and sanitization on all user inputs related to booking forms and plugin endpoints. 5) Restricting access to plugin-related endpoints via IP whitelisting or authentication where possible. 6) Performing regular security audits and penetration testing focused on WordPress plugins. 7) Ensuring backups are up to date and tested for restoration to recover quickly from potential compromises. 8) Educating IT and security teams about the vulnerability to recognize signs of exploitation. These measures go beyond generic advice by focusing on plugin-specific controls and proactive monitoring.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:20:58.862Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0564eb3efac36700b47
Added to database: 12/18/2025, 7:42:14 AM
Last enriched: 1/21/2026, 12:22:19 AM
Last updated: 2/6/2026, 1:59:12 AM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.