Skip to main content

CVE-2025-9790: SQL Injection in SourceCodester Hotel Reservation System

Medium
VulnerabilityCVE-2025-9790cvecve-2025-9790
Published: Mon Sep 01 2025 (09/01/2025, 18:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Hotel Reservation System

Description

A security flaw has been discovered in SourceCodester Hotel Reservation System 1.0. This affects an unknown part of the file /admin/updateabout.php. The manipulation of the argument address results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 09/01/2025, 19:02:57 UTC

Technical Analysis

CVE-2025-9790 is a SQL Injection vulnerability identified in SourceCodester Hotel Reservation System version 1.0. The flaw exists in the /admin/updateabout.php script, specifically in the handling of the 'address' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This vulnerability is remotely exploitable without requiring authentication or user interaction, making it particularly dangerous. The injection can lead to unauthorized data access, data modification, or potentially full compromise of the database. The CVSS 4.0 score of 6.9 (medium severity) reflects the ease of exploitation (network vector, no privileges or user interaction needed) but limited impact on confidentiality, integrity, and availability (low to limited impact). However, the vulnerability's presence in a hotel reservation system is critical because such systems typically store sensitive customer data including personal identification and payment information. The lack of a patch or mitigation details increases risk, especially since the exploit code has been publicly released, raising the likelihood of exploitation by opportunistic attackers.

Potential Impact

For European organizations operating or using the SourceCodester Hotel Reservation System 1.0, this vulnerability poses a significant risk to customer data confidentiality and system integrity. Exploitation could lead to unauthorized disclosure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. Additionally, attackers could alter reservation data or disrupt booking operations, impacting business continuity. Given the hospitality sector's reliance on trust and data privacy, a breach could lead to loss of customer confidence and financial losses. The remote and unauthenticated nature of the exploit increases the threat level, especially for smaller hotels or chains that may lack robust cybersecurity defenses. Furthermore, the public availability of exploit code lowers the barrier for attackers, potentially increasing attack volume and impact across Europe.

Mitigation Recommendations

Organizations should immediately audit their use of SourceCodester Hotel Reservation System 1.0 and prioritize upgrading to a patched version once available. In the absence of an official patch, implement web application firewall (WAF) rules specifically targeting SQL injection patterns on the /admin/updateabout.php endpoint and the 'address' parameter. Employ input validation and parameterized queries or prepared statements in the application code to prevent injection. Restrict access to the /admin directory via IP whitelisting or VPN to reduce exposure. Conduct thorough logging and monitoring for unusual database queries or access patterns. Regularly back up databases to enable recovery in case of data tampering. Finally, perform security awareness training for administrators to recognize and respond to suspicious activity promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-01T10:08:24.375Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b5ea4dad5a09ad00d2953e

Added to database: 9/1/2025, 6:47:41 PM

Last enriched: 9/1/2025, 7:02:57 PM

Last updated: 9/4/2025, 6:00:28 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats