CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/add_room.php. The manipulation of the argument room_type leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Analysis
A critical SQL injection vulnerability exists in code-projects Simple Online Hotel Reservation System version 1.0, specifically in the /admin/add_room.php file where the 'room_type' parameter is insufficiently sanitized. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion of hotel reservation system data. A proof-of-concept exploit has been publicly disclosed, increasing real-world exploitation risk.
Technical Context
The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements used in an Output ('Injection')) stemming from inadequate input validation and parameterized query implementation in PHP. The Simple Online Hotel Reservation System 1.0 (affected CPE would be cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*) fails to properly escape or bind the 'room_type' parameter in database queries within the administrative add_room.php endpoint. This allows attackers to inject malicious SQL syntax that bypasses intended query logic, commonly used to exfiltrate user credentials, reservation data, or administrative information from the backend database.
Affected Products
- vendor: code-projects; product: Simple Online Hotel Reservation System; version: 1.0; cpe: cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*; affected_component: /admin/add_room.php; vulnerable_parameter: room_type
Remediation
Upgrade to the latest patched version if available from code-projects. If no patch exists, consider alternative hotel management systems. Workaround (Immediate): Implement IP whitelisting or require VPN/authentication gateway access to administrative endpoints. Code-Level Mitigation: Refactor add_room.php to use mysqli prepared statements or PDO with parameterized queries instead of string concatenation. Input Validation: Validate room_type against a predefined list of allowed room types before any database operation. Detection: Enable ModSecurity or similar WAF with OWASP ModSecurity Core Rule Set to block SQL injection attempts.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18824