CVE Alert: CVE-2025-10621 – SourceCodester – Hotel Reservation System

CVE-2025-10621

HIGHNo exploitation known

A vulnerability was determined in SourceCodester Hotel Reservation System 1.0. The affected element is an unknown function of the file editroomimage.php. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
SourceCodester
Product
Hotel Reservation System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-17T22:02:07.463Z
Updated
2025-09-17T22:02:07.463Z

AI Summary Analysis

Risk verdict

High risk: remote, unauthenticated SQL injection with publicly disclosed exploit; active threat potential depending on exposure.

Why this matters

The flaw enables an attacker to potentially access or alter sensitive data without user interaction, rising to data leakage or data integrity/availability impact. With a web-facing SQL injection, opportunistic actors could automation-scan for vulnerable instances and pivot within the database environment.

Most likely attack path

Exploitation requires network access to the vulnerable endpoint, with no authentication or user interaction. An attacker can craft an malicious ID value to trigger SQL injection, exposing or modifying database contents and potentially enabling lateral movement within the application stack. The prevalence of network-remote access and low/no preconditions makes rapid exploitation feasible against exposed deployments.

Who is most exposed

Web deployments of administrative hotel-reservation interfaces that rely on direct user-supplied parameters without robust input handling are most at risk, especially if publicly accessible or poorly firewalled.

Detection ideas

  • Logs showing requests to editroomimage.php with unusual or encoded ID parameters.
  • SQL error messages or abnormal database query patterns in web/app logs.
  • Unusual spikes in DB connections from external sources or automated probes.
  • WAF alerts for SQL injection patterns targeting dynamic URL parameters.
  • PoC indicators or exploit payloads appearing in incident intel feeds or proxy logs.

Mitigation and prioritisation

  • Apply vendor-supplied patch or upgrade to a fixed release; verify hotfix applicability and regression tests.
  • Implement input validation and parameterised queries (prepared statements) across all dynamic SQL points.
  • Restrict access to the vulnerable endpoint behind authentication, IP whitelisting, or VPN.
  • Harden the application layer: disable verbose error reporting; implement strict error handling.
  • Change-management: alert asset owners, inventory affected instances, and schedule phased remediation. If KEV is true or EPSS ≥ 0.5, treat as priority 1. If these indicators are unknown, maintain high-priority remediation and close monitoring.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.