EUVD-2025-18831

| CVE-2025-6451 HIGH
2025-06-22 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 21:55 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:55 euvd
EUVD-2025-18831
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jun 22, 2025 - 02:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/delete_pending.php. The manipulation of the argument transaction_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

Analysis

CVE-2025-6451 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System version 1.0, affecting the /admin/delete_pending.php file where the transaction_id parameter is unsanitized. An unauthenticated remote attacker can exploit this to execute arbitrary SQL queries, potentially leading to data exfiltration, modification, or deletion of the hotel reservation database. Public exploit disclosure and active threat indicators suggest this vulnerability warrants immediate patching.

Technical Context

This vulnerability exploits improper input validation in PHP-based web application code, specifically in the administrative delete_pending.php endpoint. The root cause is classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), indicating that user-supplied transaction_id parameters are passed directly to SQL queries without parameterized statements or proper escaping. The vulnerable code likely constructs SQL queries using string concatenation (e.g., `SELECT * FROM transactions WHERE transaction_id = '$_GET[transaction_id]'`) rather than prepared statements. Affected product: code-projects Simple Online Hotel Reservation System 1.0 (CPE context: hotel reservation management software written in PHP).

Affected Products

- vendor: code-projects; product: Simple Online Hotel Reservation System; version: 1.0; vulnerable_component: /admin/delete_pending.php; vulnerable_parameter: transaction_id; cpe: cpe:2.3:a:code-projects:simple_online_hotel_reservation_system:1.0:*:*:*:*:*:*:*; attack_vector: Remote, unauthenticated HTTP request

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-18831 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy