CVE-2025-6578

| EUVD-2025-19070 HIGH
2025-06-24 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19070
PoC Detected
Jul 11, 2025 - 15:53 vuln.today
Public exploit code
CVE Published
Jun 24, 2025 - 20:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/delete_account.php. The manipulation of the argument admin_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6578 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System version 1.0 affecting the /admin/delete_account.php file through unsanitized admin_id parameter manipulation. An unauthenticated remote attacker can execute arbitrary SQL queries to read, modify, or delete database contents. The vulnerability has been publicly disclosed with proof-of-concept code available, presenting immediate exploitation risk for deployed instances.

Technical Context

The vulnerability exists in code-projects/Simple Online Hotel Reservation System v1.0, a PHP-based web application for hotel reservations. The root cause is CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), specifically SQL injection. The /admin/delete_account.php endpoint accepts an admin_id parameter that is passed directly to SQL queries without proper input validation, prepared statements, or parameterized query usage. This allows attackers to inject arbitrary SQL syntax. The affected technology stack includes PHP and a backend SQL database (likely MySQL/MariaDB based on typical hotel reservation system architecture).

Affected Products

Product: Simple Online Hotel Reservation System; Vendor: code-projects; Affected Version(s): 1.0; Component: /admin/delete_account.php; Parameter: admin_id; CPE (estimated): cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*. All instances of v1.0 of this application are vulnerable. Configuration note: vulnerability is accessible to unauthenticated users if admin panel lacks proper access controls (common misconfiguration in open-source projects).

Remediation

Immediate actions: (1) Apply input validation to admin_id parameter—whitelist alphanumeric characters only if admin_id is numeric; (2) Implement prepared statements/parameterized queries in /admin/delete_account.php using PHP PDO or mysqli prepared statement APIs; (3) Apply principle of least privilege to database user executing queries; (4) Restrict /admin/* paths to authenticated users via authentication middleware/checks. Patch/Update: Contact code-projects for patched version >1.0. If no vendor patch available within 30 days, consider: deploying Web Application Firewall (WAF) rules to block SQL injection patterns in admin_id parameter; implementing rate limiting on delete_account.php; conducting emergency code audit of all database-connected endpoints in the application. Workaround: Temporarily disable or restrict network access to /admin/ endpoint until patch is deployed.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

CVE-2025-6578 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy