Skip to main content

CVE-2025-6917: SQL Injection in code-projects Online Hotel Booking

Medium
VulnerabilityCVE-2025-6917cvecve-2025-6917
Published: Mon Jun 30 2025 (06/30/2025, 17:32:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Hotel Booking

Description

A vulnerability has been found in code-projects Online Hotel Booking 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/registration.php. The manipulation of the argument uname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/30/2025, 17:54:40 UTC

Technical Analysis

CVE-2025-6917 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Hotel Booking application. The vulnerability resides in the /admin/registration.php file, specifically in the handling of the 'uname' parameter. An attacker can remotely exploit this flaw by manipulating the 'uname' argument to inject malicious SQL code. This injection can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data. The vulnerability requires no authentication or user interaction, making it highly accessible for remote exploitation. The CVSS 4.0 base score is 6.9, indicating a medium severity level, with an attack vector that is network-based, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is low to medium, suggesting that while the vulnerability can be exploited remotely, the scope of damage may be somewhat limited by the application's design or database permissions. No patches or fixes have been published yet, and although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of imminent attacks. The vulnerability's presence in an online hotel booking system is particularly concerning as such platforms often handle personal customer data and payment information, which could be targeted or exposed through this flaw.

Potential Impact

For European organizations using the affected Online Hotel Booking 1.0 software, this vulnerability poses a significant risk to the confidentiality and integrity of customer data, including personal identification and potentially payment details. Exploitation could lead to data breaches, loss of customer trust, regulatory penalties under GDPR, and financial losses. The ability to remotely exploit the vulnerability without authentication increases the threat level, especially for organizations that have not implemented additional security controls such as web application firewalls or input validation. Furthermore, the compromise of booking systems could disrupt business operations, affecting availability and causing reputational damage. Given the critical nature of hospitality services in Europe, especially in countries with high tourism volumes, the impact could be substantial if exploited at scale.

Mitigation Recommendations

Organizations should immediately audit their use of the code-projects Online Hotel Booking 1.0 software and consider the following specific mitigations: 1) Implement strict input validation and sanitization on the 'uname' parameter and all user inputs to prevent SQL injection. 2) Employ parameterized queries or prepared statements in the database access layer to eliminate direct concatenation of user inputs into SQL commands. 3) Deploy a Web Application Firewall (WAF) with rules tailored to detect and block SQL injection attempts targeting the vulnerable endpoint. 4) Restrict database user privileges to the minimum necessary, limiting the potential damage of a successful injection. 5) Monitor application logs and network traffic for unusual activity indicative of exploitation attempts. 6) If possible, upgrade or replace the vulnerable software with a patched or alternative solution. 7) Conduct regular security assessments and penetration testing focused on injection flaws. Since no official patch is available, these compensating controls are critical to reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-29T16:34:26.588Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6862cbce6f40f0eb728c82e7

Added to database: 6/30/2025, 5:39:26 PM

Last enriched: 6/30/2025, 5:54:40 PM

Last updated: 7/11/2025, 10:48:26 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats