CVE Alert: CVE-2025-10812 – code-projects – Hostel Management System

CVE-2025-10812

HIGHNo exploitation knownPoC observed

A vulnerability has been found in code-projects Hostel Management System 1.0. This impacts an unknown function of the file /justines/admin/mod_amenities/index.php?view=view. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS v3.1 (7.3)
Vendor
code-projects
Product
Hostel Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-22T19:32:05.935Z
Updated
2025-09-22T19:52:28.555Z

AI Summary Analysis

Risk verdict

High risk: remote SQL injection with a publicly available PoC and exploitability indicators; treat as high urgency for remediation.

Why this matters

The vulnerability can be exploited without authentication or user interaction, enabling data disclosure and potential integrity impacts through crafted queries. Public exploitation signals and automation potential mean attacker success is plausible against exposed web-admin surfaces, risking guest data, administrative records, and regulatory exposure for affected sites.

Most likely attack path

An attacker sends a crafted HTTP request to the vulnerable endpoint with a manipulated ID parameter, exploiting the SQL injection remotely. No user credentials or UI actions are required, and the impact is limited to data confidentiality, integrity, and availability per CVSS, but data exfiltration or unauthorized modifications remain feasible. Lateral movement is unlikely beyond the compromised data context due to low privilege requirements.

Who is most exposed

Organizations running publicly accessible hostel/hospitality management web apps, especially older deployments on internet-facing admin panels, are most at risk. SMBs with minimal patching and exposed admin interfaces are typical patterns.

Detection ideas

  • Unusual or malformed requests to the admin endpoint with suspicious ID values.
  • SQL error messages or excessive database error codes in app or DB logs.
  • Anomalous data retrieval patterns or unexpected data volumes from the affected tables.
  • WAF alerts or rule hits for SQL injection patterns targeting the endpoint.
  • PoC indicators in security telemetry or public exploit chatter.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to patched release as a priority; verify in staging before production.
  • If patching isn’t feasible, implement compensating controls: disable or restrict remote access to the admin path, require VPN/IP allowlisting.
  • Enforce least-privilege DB accounts and use parameterised queries/prepared statements.
  • Implement input validation and output encoding; harden with a Web Application Firewall rule set targeting SQLi patterns.
  • Change-management: test fix in a staging environment, then phased rollout with monitoring for anomalous DB activity.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.