CVE-2025-11405
📋 TL;DR
This SQL injection vulnerability in SourceCodester Hotel and Lodge Management System 1.0 allows attackers to manipulate database queries through the /del_tax.php file's ID parameter. Attackers can potentially read, modify, or delete database contents. All deployments of this specific software version are affected.
💻 Affected Systems
- SourceCodester Hotel and Lodge Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover via SQL injection to execute arbitrary commands.
Likely Case
Unauthorized data access, privilege escalation, or data manipulation affecting hotel/lodge management records.
If Mitigated
Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.
🎯 Exploit Status
Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: https://www.sourcecodester.com/
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement strict input validation and parameterized queries for the ID parameter in /del_tax.php
Web Application Firewall (WAF)
allDeploy WAF with SQL injection protection rules to block malicious requests
🧯 If You Can't Patch
- Restrict access to /del_tax.php file using authentication or IP whitelisting
- Implement database user with minimal necessary permissions (principle of least privilege)
🔍 How to Verify
Check if Vulnerable:
Test /del_tax.php with SQL injection payloads in ID parameter (e.g., ' OR '1'='1)
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Test that SQL injection attempts no longer succeed and return proper error handling
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed requests to /del_tax.php with SQL syntax
Network Indicators:
- HTTP requests to /del_tax.php containing SQL keywords in parameters
SIEM Query:
source="web_logs" AND uri="/del_tax.php" AND (param="ID" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|or|and|--|#|;)")