CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/delete_account.php. The manipulation of the argument admin_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6578 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System version 1.0 affecting the /admin/delete_account.php file through unsanitized admin_id parameter manipulation. An unauthenticated remote attacker can execute arbitrary SQL queries to read, modify, or delete database contents. The vulnerability has been publicly disclosed with proof-of-concept code available, presenting immediate exploitation risk for deployed instances.
Technical Context
The vulnerability exists in code-projects/Simple Online Hotel Reservation System v1.0, a PHP-based web application for hotel reservations. The root cause is CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), specifically SQL injection. The /admin/delete_account.php endpoint accepts an admin_id parameter that is passed directly to SQL queries without proper input validation, prepared statements, or parameterized query usage. This allows attackers to inject arbitrary SQL syntax. The affected technology stack includes PHP and a backend SQL database (likely MySQL/MariaDB based on typical hotel reservation system architecture).
Affected Products
Product: Simple Online Hotel Reservation System; Vendor: code-projects; Affected Version(s): 1.0; Component: /admin/delete_account.php; Parameter: admin_id; CPE (estimated): cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*. All instances of v1.0 of this application are vulnerable. Configuration note: vulnerability is accessible to unauthenticated users if admin panel lacks proper access controls (common misconfiguration in open-source projects).
Remediation
Immediate actions: (1) Apply input validation to admin_id parameter—whitelist alphanumeric characters only if admin_id is numeric; (2) Implement prepared statements/parameterized queries in /admin/delete_account.php using PHP PDO or mysqli prepared statement APIs; (3) Apply principle of least privilege to database user executing queries; (4) Restrict /admin/* paths to authenticated users via authentication middleware/checks. Patch/Update: Contact code-projects for patched version >1.0. If no vendor patch available within 30 days, consider: deploying Web Application Firewall (WAF) rules to block SQL injection patterns in admin_id parameter; implementing rate limiting on delete_account.php; conducting emergency code audit of all database-connected endpoints in the application. Workaround: Temporarily disable or restrict network access to /admin/ endpoint until patch is deployed.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-19070