CVE-2025-6159

| EUVD-2025-18483 HIGH
2025-06-17 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18483
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jun 17, 2025 - 04:15 nvd
HIGH 7.3

Description

A vulnerability classified as critical was found in code-projects Hostel Management System 1.0. This vulnerability affects unknown code of the file /allocate_room.php. The manipulation of the argument search_box leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical SQL injection vulnerability in code-projects Hostel Management System version 1.0, specifically in the /allocate_room.php file's 'search_box' parameter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, and system disruption. The vulnerability has been publicly disclosed with proof-of-concept code available, making it actively exploitable in the wild.

Technical Context

This vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as Improperly Neutralized Special Elements in Output). The root cause is insufficient input validation and output encoding in the /allocate_room.php file, where user-supplied input from the 'search_box' parameter is directly concatenated into SQL queries without proper parameterization or escaping. The affected product is code-projects Hostel Management System 1.0, a PHP-based web application (implied by .php file extension) used for managing hostel room allocations. The vulnerability affects the database query processing layer, allowing attackers to break out of intended SQL statement boundaries and inject malicious SQL commands.

Affected Products

Product: code-projects Hostel Management System; Affected Version: 1.0; Component: /allocate_room.php; Vulnerable Parameter: search_box. CPE identifier would be: cpe:2.3:a:code-projects:hostel_management_system:1.0:*:*:*:*:*:*:*. All deployments of Hostel Management System version 1.0 are vulnerable regardless of configuration or deployment environment, as the vulnerability exists in the application code itself.

Remediation

Immediate actions: (1) Disable or restrict access to the /allocate_room.php endpoint until patching is possible, implementing network-level access controls or Web Application Firewall (WAF) rules to block requests containing SQL keywords in the search_box parameter; (2) Implement input validation to reject or sanitize special SQL characters (quotes, semicolons, dashes, parentheses) in the search_box parameter; (3) Switch to parameterized queries (prepared statements) in the vulnerable code to separate SQL logic from data. Long-term: Contact code-projects for availability of patched versions beyond 1.0, or migrate to actively maintained hostel management systems with secure coding practices. If patches are unavailable, implement database-level protections such as stored procedures with restricted permissions, limiting the application user account's SQL capabilities to only necessary operations. Regular security code reviews and static application security testing (SAST) should be implemented.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6159 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy