CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Description
A vulnerability, which was classified as critical, was found in code-projects Simple Online Hotel Reservation System 1.0. Affected is an unknown function of the file /admin/index.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Analysis
CVE-2025-6447 is a critical SQL injection vulnerability in the Simple Online Hotel Reservation System version 1.0, specifically in the /admin/index.php file's Username parameter. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or system disruption. The exploit has been publicly disclosed with proof-of-concept code available, significantly increasing the risk of active exploitation.
Technical Context
This vulnerability is classified as CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), which manifests as SQL injection (CWE-89). The Simple Online Hotel Reservation System likely uses PHP with a backend database (MySQL/MariaDB). The vulnerability exists in the administrative authentication mechanism (/admin/index.php) where user-supplied input (Username parameter) is not properly sanitized or parameterized before being used in SQL queries. The root cause is insufficient input validation and lack of prepared statements or parameterized queries, allowing attackers to inject malicious SQL syntax directly into database queries. CPE affected: cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*
Affected Products
Simple Online Hotel Reservation System version 1.0 by code-projects. Affected component: /admin/index.php (authentication/administration module). Vulnerable parameter: Username input field. Affected configurations: All default installations accessible via network. No patch version information is publicly available from vendor advisories at this time. The application appears to be a PHP-based web application managing hotel reservations, likely storing customer information, booking details, and potentially payment data.
Remediation
Immediate remediation steps: (1) Apply input validation and sanitization to the Username parameter using prepared statements/parameterized queries (e.g., PDO prepared statements or mysqli prepared statements in PHP); (2) Implement parameterized SQL queries with bound parameters instead of string concatenation; (3) Apply principle of least privilege to database user accounts running admin queries; (4) Implement Web Application Firewall (WAF) rules to detect and block SQL injection attempts; (5) Enforce strong authentication and rate-limiting on /admin/index.php; (6) Monitor database logs for suspicious SQL patterns. No official patch is currently documented. Organizations should contact code-projects vendor directly for security updates or implement a code review and patched version internally. As a temporary workaround, restrict network access to /admin/index.php via IP whitelisting or VPN, and implement request filtering for SQL keywords.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18828