CVE Alert: CVE-2025-11055 – SourceCodester – Online Hotel Reservation System

CVE-2025-11055

HIGHNo exploitation known

A vulnerability was detected in SourceCodester Online Hotel Reservation System 1.0. Affected is an unknown function of the file /admin/updateaddress.php. The manipulation of the argument address results in sql injection. The attack may be launched remotely. The exploit is now public and may be used.

CVSS v3.1 (7.3)
Vendor
SourceCodester
Product
Online Hotel Reservation System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-27T10:02:06.563Z
Updated
2025-09-27T10:02:06.563Z

AI Summary Analysis

Risk verdict

High risk with a publicly available exploit; remote, unauthenticated SQL injection in an admin-facing endpoint. Treat as priority 1.

Why this matters

An attacker can potentially exfiltrate or alter database contents without user interaction. With no authentication required, sensitive data exposure and integrity loss are realistic goals, creating regulatory and reputational risks for affected organisations.

Most likely attack path

An attacker targets the vulnerable updateaddress.php endpoint, sending crafted input via the address parameter to trigger SQL injection. Because authentication is not required and no user interaction is needed, reconnaissance and exploitation can occur over the web, with potential data disclosure or modification limited to the application’s database privileges.

Who is most exposed

Web deployments exposing admin functions publicly on the internet are at highest risk, especially SMBs using the affected software stack or templates that mirror this vulnerable pattern.

Detection ideas

  • Spike in requests to the admin/updateaddress.php endpoint with suspicious address values.
  • SQL error messages or database errors appearing in responses or logs.
  • Anomalous data retrieved or altered via the endpoint (unexpected rows/columns).
  • WAF/IDS alerts for injectable payloads (tautologies, union-based patterns, union select).
  • Increased DB queries or slow responses correlating with specific parameterised inputs.

Mitigation and prioritisation

  • Apply the vendor patch or upgrade to a fixed version immediately.
  • Enforce parameterised queries and strict input validation for all user-supplied fields.
  • Restrict access to admin endpoints (IP allowlists, VPN, MFA) and implement least-privilege DB accounts.
  • Deploy WAF rules targeting SQLi patterns and monitor for injection attempts.
  • Change management: test in staging, verify no regressions, then rollout urgently. Treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.