CVE-2025-6421

| EUVD-2025-18876 HIGH
2025-06-21 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:35 euvd
EUVD-2025-18876
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jun 21, 2025 - 22:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/add_account.php. The manipulation of the argument name/admin_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

A critical SQL injection vulnerability exists in code-projects Simple Online Hotel Reservation System version 1.0, specifically in the /admin/add_account.php file where the 'name' or 'admin_id' parameters are not properly sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion of the hotel reservation database. Public exploit code is available and the vulnerability is actively being disclosed, increasing exploitation risk in the wild.

Technical Context

The vulnerability is a classic SQL injection (CWE-74: Improper Neutralization of Special Elements used in an SQL Command) vulnerability in a PHP-based web application. The /admin/add_account.php endpoint fails to properly validate or parameterize SQL queries before incorporating user-supplied input from the 'name' or 'admin_id' parameters. The affected software is code-projects Simple Online Hotel Reservation System 1.0 (likely CPE: cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*). The vulnerability stems from inadequate input validation and likely missing prepared statements or parameterized queries in the PHP backend, allowing attackers to break out of intended SQL context and inject malicious SQL syntax.

Affected Products

- vendor: code-projects; product: Simple Online Hotel Reservation System; versions: ['1.0']; affected_components: ['/admin/add_account.php']; vulnerable_parameters: ['name', 'admin_id']; cpe: cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6421 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy