EUVD-2025-18893

| CVE-2025-6419 HIGH
2025-06-21 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 21:35 euvd
EUVD-2025-18893
PoC Detected
Oct 23, 2025 - 20:06 vuln.today
Public exploit code
CVE Published
Jun 21, 2025 - 21:15 nvd
HIGH 7.3

Description

A vulnerability was found in code-projects Simple Online Hotel Reservation System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/edit_room.php. The manipulation of the argument room_type leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

Analysis

CVE-2025-6419 is a critical SQL injection vulnerability in code-projects Simple Online Hotel Reservation System 1.0 affecting the /admin/edit_room.php endpoint, where the 'room_type' parameter is improperly sanitized, allowing unauthenticated remote attackers to execute arbitrary SQL commands. The vulnerability has a CVSS score of 7.3 with public proof-of-concept code available, indicating active exploitation risk and widespread discoverability.

Technical Context

The vulnerability stems from CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component - 'Injection'), specifically manifesting as SQL injection in a PHP-based hotel reservation system. The /admin/edit_room.php file fails to properly parameterize or escape user input from the 'room_type' GET/POST parameter before incorporating it into SQL queries, likely using string concatenation rather than prepared statements or parameterized queries. This is a classic improper input validation issue in legacy PHP applications that predate modern ORM frameworks and security-aware coding practices. The affected product is code-projects Simple Online Hotel Reservation System version 1.0, typically deployed on Apache/PHP web servers with MySQL or similar DBMS backends.

Affected Products

Simple Online Hotel Reservation System (['1.0'])

Remediation

- priority: IMMEDIATE; action: Disable or restrict access to /admin/edit_room.php using web server controls (e.g., .htaccess, nginx rules) until patching is possible; details: Implement IP whitelisting for admin interfaces or require VPN/bastion host access - priority: CRITICAL; action: Apply input validation and parameterized queries; details: Replace all string concatenation in SQL queries with prepared statements using parameterized queries (mysqli_prepare, PDO prepared statements). Validate room_type parameter against an allowlist of expected values before use in SQL context. - priority: HIGH; action: Migrate to maintained alternative; details: Given the apparent abandonment of Simple Online Hotel Reservation System 1.0, consider migrating to actively maintained hotel management platforms (e.g., Hotelogix, Cloudbeds, or similar SaaS solutions) or modern open-source alternatives with active security patching - priority: MEDIUM; action: Implement Web Application Firewall (WAF) rules; details: Deploy rules to detect and block SQL injection patterns in room_type parameter (e.g., detecting quotes, SQL keywords, comment characters) - priority: MEDIUM; action: Database-level hardening; details: Create database user account with minimal required privileges (least privilege principle) for the application—avoid using root/admin accounts for application database connections - priority: LOW; action: Monitoring and detection; details: Implement query logging and anomaly detection on database connections; monitor for unusual SQL patterns or multi-statement executions

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-18893 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy