CVE-2025-11399
📋 TL;DR
This SQL injection vulnerability in SourceCodester Hotel and Lodge Management System 1.0 allows attackers to manipulate database queries through the 'floorno' parameter in /pages/save_room.php. Remote attackers can potentially read, modify, or delete database content. All users running the vulnerable version are affected.
💻 Affected Systems
- SourceCodester Hotel and Lodge Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, privilege escalation, or system takeover via SQL injection to execute arbitrary commands.
Likely Case
Unauthorized data access, manipulation of hotel/lodge records, or partial database corruption.
If Mitigated
Limited impact with proper input validation and database permissions restricting damage to non-critical data.
🎯 Exploit Status
Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://www.sourcecodester.com/
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Input Validation and Parameterized Queries
PHPModify /pages/save_room.php to validate 'floorno' parameter and use prepared statements.
Edit save_room.php to replace direct SQL with parameterized queries using PDO or mysqli prepared statements
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.
Configure WAF to block requests containing SQL injection patterns to /pages/save_room.php
🧯 If You Can't Patch
- Restrict network access to the management system to trusted IPs only
- Implement database user with minimal necessary permissions (read-only where possible)
🔍 How to Verify
Check if Vulnerable:
Test the /pages/save_room.php endpoint with SQL injection payloads in the 'floorno' parameter
Check Version:
Check system version in admin panel or review source code for version markers
Verify Fix Applied:
Attempt SQL injection after implementing fixes and verify no database manipulation occurs
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in application logs
- Multiple failed login attempts following SQL injection patterns
- Unexpected database queries from save_room.php
Network Indicators:
- HTTP requests to /pages/save_room.php with SQL keywords in parameters
- Unusual database traffic patterns
SIEM Query:
source="web_logs" AND uri="/pages/save_room.php" AND (param="floorno" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "OR 1=1")