CVE Alert: CVE-2025-10797 – code-projects – Hostel Management System

CVE-2025-10797

HIGHNo exploitation knownPoC observed

A vulnerability was determined in code-projects Hostel Management System 1.0. This issue affects some unknown processing of the file /justines/index.php. This manipulation of the argument log_email causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Hostel Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-22T12:02:06.765Z
Updated
2025-09-22T12:43:31.675Z

AI Summary Analysis

Risk verdict

Urgent: publicly disclosed PoC enables remote, unauthenticated SQL injection, making exploitation feasible via the web interface.

Why this matters

Compromise can lead to leakage or manipulation of customer and reservation data, payment records, and credentials. Attackers can potentially extract sensitive information or alter records, with business disruption from data integrity issues and possible regulatory exposure.

Most likely attack path

Given remote, unauthenticated access (AV:N, UI:N, PR:N) and no user interaction required, an attacker can craft input to the log_email parameter in the web endpoint to trigger SQL injection. The impact targets confidentiality, integrity and availability of the DB (I:L, C:L, A:L). Lateral movement is unlikely without additional footholds, but data exfiltration or tampering within the application’s scope is plausible.

Who is most exposed

Web-facing deployments of small-business hostel management systems (especially version 1.0) running on public networks are most at risk. If exposed via shared hosting or misconfigured internet access, remediation becomes more urgent.

Detection ideas

  • Unusual log_email query strings and unusual DB error messages in application logs
  • spikes in 500/DB-related errors or slow queries tied to /justines/index.php
  • anomalous data access patterns from unauthorised IPs
  • repeated injection-like payloads or stack traces in logs
  • WAF/IPS alerts for suspicious SQL patterns

Mitigation and prioritisation

  • Apply the vendor patch or upgrade to a fixed release; validate in staging before production.
  • Enforce parameterised queries and input validation; remove direct string concatenation in SQL.
  • Implement least-privilege DB accounts and disable unnecessary remote DB access.
  • Deploy or strengthen WAF/IPS rules to block common SQLi payloads; enable detailed DB audit logging.
  • Change-management: schedule a rapid patch window, monitor post-deployment, and verify no regressions.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.