Skip to main content

CVE-2025-7606: SQL Injection in code-projects AVL Rooms

Medium
VulnerabilityCVE-2025-7606cvecve-2025-7606
Published: Mon Jul 14 2025 (07/14/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: AVL Rooms

Description

A vulnerability classified as critical has been found in code-projects AVL Rooms 1.0. This affects an unknown part of the file /city.php. The manipulation of the argument city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/14/2025, 13:31:07 UTC

Technical Analysis

CVE-2025-7606 is a SQL Injection vulnerability identified in version 1.0 of the AVL Rooms application developed by code-projects. The vulnerability exists in the /city.php file, specifically through the manipulation of the 'city' parameter. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by injecting malicious SQL code into the 'city' argument. This can lead to unauthorized access or modification of the backend database, potentially exposing sensitive data or enabling further attacks such as data exfiltration, privilege escalation, or denial of service. The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity, reflecting that while the attack vector is network-based and requires no privileges or user interaction, the impact on confidentiality, integrity, and availability is limited to low levels. No official patches or fixes have been published yet, and no known exploits are currently observed in the wild, although public disclosure of the exploit details increases the risk of exploitation.

Potential Impact

For European organizations using AVL Rooms 1.0, this vulnerability poses a risk of unauthorized database access and potential data breaches. Given that the attack can be launched remotely without authentication, any exposed AVL Rooms installations could be targeted by attackers to extract sensitive customer or operational data, manipulate booking or room information, or disrupt service availability. This could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and operational disruptions. The medium severity score suggests the impact is moderate, but the ease of exploitation and public availability of exploit code increase the urgency for mitigation. Organizations in sectors such as hospitality, real estate, or property management using this software in Europe should be particularly vigilant.

Mitigation Recommendations

Since no official patches are currently available, European organizations should immediately implement the following mitigations: 1) Apply input validation and sanitization on the 'city' parameter to block malicious SQL code, using parameterized queries or prepared statements where possible. 2) Restrict external access to the /city.php endpoint via network controls such as firewalls or VPNs to limit exposure. 3) Monitor web application logs for unusual or suspicious requests targeting the 'city' parameter indicative of injection attempts. 4) Employ Web Application Firewalls (WAFs) with rules to detect and block SQL injection patterns targeting this endpoint. 5) Plan for prompt upgrade or patch deployment once an official fix is released by the vendor. 6) Conduct security audits and penetration testing focused on SQL injection vulnerabilities in AVL Rooms installations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-13T14:39:32.418Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68750312a83201eaacc6b38b

Added to database: 7/14/2025, 1:16:02 PM

Last enriched: 7/14/2025, 1:31:07 PM

Last updated: 7/16/2025, 1:24:08 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats