CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/edit_query_account.php. The manipulation of the argument Name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6418 is a critical SQL injection vulnerability in Simple Online Hotel Reservation System 1.0 affecting the /admin/edit_query_account.php endpoint, where the 'Name' parameter is improperly sanitized, allowing remote attackers to execute arbitrary SQL queries without authentication. The vulnerability has been publicly disclosed with exploit code availability, making it a high-priority threat for organizations running this system in production; attackers can manipulate database queries to extract sensitive data, modify records, or potentially escalate privileges.
Technical Context
The vulnerability is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as 'Injection') manifesting as SQL injection. The affected component is a PHP application (Simple Online Hotel Reservation System v1.0) where user-supplied input in the 'Name' parameter of /admin/edit_query_account.php is concatenated directly into SQL queries without proper parameterized prepared statements or input validation. This is a classic first-order SQL injection vulnerability where attacker-controlled input reaches a SQL query construction function without sufficient neutralization. The admin-facing endpoint suggests this may bypass basic authentication checks or target authenticated admin users, though the CVSS vector (PR:N) indicates no privilege requirement, suggesting the endpoint may be accessible without authentication or the authentication mechanism is separately bypassable.
Affected Products
Simple Online Hotel Reservation System version 1.0 (likely CPE: cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*). The specific vulnerable component is /admin/edit_query_account.php. No vendor patch or advisory links are referenced in the provided data; the system appears to be a third-party/community project from 'code-projects' with limited official support infrastructure. Any installations running version 1.0 are affected; patch availability status is unknown from provided sources.
Remediation
Immediate actions: (1) Implement input validation on the 'Name' parameter in /admin/edit_query_account.php using allowlist-based validation (alphanumeric + safe characters only); (2) Replace all dynamic SQL query construction with parameterized prepared statements (parameterized queries using placeholders); (3) Apply the principle of least privilege to the database user account used by the PHP application, restricting to SELECT/UPDATE on necessary tables only; (4) Implement Web Application Firewall (WAF) rules to detect and block SQL injection payloads (e.g., detecting SQL keywords like UNION, SELECT, OR in parameter values); (5) Monitor database query logs for suspicious patterns. Long-term: contact the vendor (code-projects) for patch availability or migrate to a maintained hotel reservation system. No official patch version is referenced; if vendor does not provide updates, consider forking and patching internally or replacement.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18822