CVE-2025-12856
📋 TL;DR
CVE-2025-12856 is a SQL injection vulnerability in Responsive Hotel Site 1.0's reservation.php admin endpoint. Attackers can manipulate the email parameter to execute arbitrary SQL commands remotely. This affects all installations of Responsive Hotel Site 1.0 with the vulnerable admin interface exposed.
💻 Affected Systems
- Responsive Hotel Site
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including credential theft, data exfiltration, and potential remote code execution via database functions.
Likely Case
Unauthorized data access, modification of reservation records, and potential privilege escalation within the application.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only read access to non-sensitive data.
🎯 Exploit Status
Exploit requires access to the admin interface but no authentication bypass. Public exploit code is available on GitHub.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd parameterized queries or proper input sanitization to the email parameter in reservation.php
Modify /admin/reservation.php to use prepared statements with PDO or mysqli
Access Restriction
linuxRestrict access to the admin interface using IP whitelisting or authentication
Add .htaccess rules to restrict /admin/ directory to specific IPs
🧯 If You Can't Patch
- Implement a web application firewall (WAF) with SQL injection rules
- Disable or remove the /admin/reservation.php endpoint if not needed
🔍 How to Verify
Check if Vulnerable:
Test the /admin/reservation.php endpoint with SQL injection payloads in the email parameter
Check Version:
Check the software version in the application's configuration or about page
Verify Fix Applied:
Verify that SQL injection attempts no longer succeed and proper input validation is in place
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in database logs
- Multiple failed login attempts to admin interface
- Suspicious email parameter values in web logs
Network Indicators:
- SQL injection patterns in HTTP requests to /admin/reservation.php
- Unusual database connection patterns from web server
SIEM Query:
source="web_logs" AND uri="/admin/reservation.php" AND (email="*' OR*" OR email="*;--*" OR email="*UNION*" OR email="*SELECT*" OR email="*INSERT*")
🔗 References
- https://code-projects.org/
- https://github.com/AmengDream/CVE/blob/main/Responsive_Hotel_Site/reservation-sql-injection/report.md
- https://vuldb.com/?ctiid.331502
- https://vuldb.com/?id.331502
- https://vuldb.com/?submit.679744
- https://github.com/AmengDream/CVE/blob/main/Responsive_Hotel_Site/reservation-sql-injection/report.md