CVE-2025-11469

6.3 MEDIUM

📋 TL;DR

This SQL injection vulnerability in SourceCodester Hotel and Lodge Management System 1.0 allows attackers to manipulate database queries through the Contact parameter in /pages/save_customer.php. Attackers can potentially read, modify, or delete database content, and the vulnerability is remotely exploitable. All users running the affected version are vulnerable.

💻 Affected Systems

Products:
  • SourceCodester Hotel and Lodge Management System
Versions: 1.0
Operating Systems: Any OS running PHP and MySQL/MariaDB
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PHP and database backend (typically MySQL/MariaDB). Vulnerability exists in default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, privilege escalation, and potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized data access and manipulation of customer records, potentially leading to data breach and system integrity compromise.

🟢

If Mitigated

Limited impact with proper input validation and database permission restrictions in place.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and a public exploit exists.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires access to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.sourcecodester.com/

Restart Required: No

Instructions:

No official patch available. Consider implementing input validation and parameterized queries as workaround.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation for the Contact parameter to reject SQL injection attempts

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting /pages/save_customer.php

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to the vulnerable system
  • Deploy intrusion detection systems to monitor for SQL injection attempts

🔍 How to Verify

Check if Vulnerable:

Test the /pages/save_customer.php endpoint with SQL injection payloads in the Contact parameter

Check Version:

Check system version in admin panel or configuration files

Verify Fix Applied:

Verify that SQL injection attempts no longer succeed and proper input validation is implemented

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts or parameter manipulation in web server logs

Network Indicators:

  • Unusual traffic patterns to /pages/save_customer.php
  • SQL error messages in HTTP responses

SIEM Query:

source="web_server" AND uri="/pages/save_customer.php" AND (param="Contact" AND value CONTAINS "' OR '")

🔗 References

📤 Share & Export