CVE-2025-6418

| EUVD-2025-18822 HIGH
2025-06-21 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:35 euvd
EUVD-2025-18822
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jun 21, 2025 - 21:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit_query_account.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6418 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System 1.0 affecting the /admin/edit_query_account.php endpoint, where the 'Name' parameter is improperly sanitized, allowing remote attackers to execute arbitrary SQL queries without authentication. The vulnerability has been publicly disclosed with exploit code availability, making it a high-priority threat for organizations running this system in production; attackers can manipulate database queries to extract sensitive data, modify records, or potentially escalate privileges.

Technical Context

The vulnerability is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as 'Injection') manifesting as SQL injection. The affected component is a PHP application (Simple Online Hotel Reservation System v1.0) where user-supplied input in the 'Name' parameter of /admin/edit_query_account.php is concatenated directly into SQL queries without proper parameterized prepared statements or input validation. This is a classic first-order SQL injection vulnerability where attacker-controlled input reaches a SQL query construction function without sufficient neutralization. The admin-facing endpoint suggests this may bypass basic authentication checks or target authenticated admin users, though the CVSS vector (PR:N) indicates no privilege requirement, suggesting the endpoint may be accessible without authentication or the authentication mechanism is separately bypassable.

Affected Products

Simple Online Hotel Reservation System version 1.0 (likely CPE: cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*). The specific vulnerable component is /admin/edit_query_account.php. No vendor patch or advisory links are referenced in the provided data; the system appears to be a third-party/community project from 'code-projects' with limited official support infrastructure. Any installations running version 1.0 are affected; patch availability status is unknown from provided sources.

Remediation

Immediate actions: (1) Implement input validation on the 'Name' parameter in /admin/edit_query_account.php using allowlist-based validation (alphanumeric + safe characters only); (2) Replace all dynamic SQL query construction with parameterized prepared statements (parameterized queries using placeholders); (3) Apply the principle of least privilege to the database user account used by the PHP application, restricting to SELECT/UPDATE on necessary tables only; (4) Implement Web Application Firewall (WAF) rules to detect and block SQL injection payloads (e.g., detecting SQL keywords like UNION, SELECT, OR in parameter values); (5) Monitor database query logs for suspicious patterns. Long-term: contact the vendor (code-projects) for patch availability or migrate to a maintained hotel reservation system. No official patch version is referenced; if vendor does not provide updates, consider forking and patching internally or replacement.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6418 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy