CVE-2025-10798
📋 TL;DR
This SQL injection vulnerability in code-projects Hostel Management System 1.0 allows attackers to manipulate database queries through the ID parameter in the admin interface. Remote attackers can potentially read, modify, or delete database content. All installations of version 1.0 with the vulnerable file accessible are affected.
💻 Affected Systems
- code-projects Hostel Management System
📦 What is this software?
Hostel Management System by Angeljudesuarez
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, or full system takeover via SQL injection leading to remote code execution.
Likely Case
Unauthorized data access, privilege escalation, or data manipulation in the hostel management database.
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-critical data.
🎯 Exploit Status
Exploit requires admin access but SQL injection is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Implement input validation and parameterized queries in /justines/admin/mod_roomtype/index.php.
🔧 Temporary Workarounds
Input Validation
allAdd server-side validation to ensure ID parameter contains only numeric values
Modify PHP code to validate $_GET['ID'] with is_numeric() or filter_var()
Web Application Firewall
allDeploy WAF rules to block SQL injection patterns
Add WAF rule: deny requests with SQL keywords in ID parameter
🧯 If You Can't Patch
- Restrict access to /justines/admin/ directory to trusted IP addresses only
- Implement database user with minimal permissions (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test the endpoint with SQL injection payload: /justines/admin/mod_roomtype/index.php?view=view&ID=1' OR '1'='1
Check Version:
Check version in application files or database configuration
Verify Fix Applied:
Test with same payload after fixes - should return error or no data
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts to admin interface
- Unusual database queries from web server
- SQL syntax errors in application logs
Network Indicators:
- HTTP requests with SQL keywords in parameters
- Unusual traffic patterns to admin endpoints
SIEM Query:
source="web_logs" AND (uri="*mod_roomtype*" AND (param="*OR*" OR param="*UNION*" OR param="*SELECT*"))