CVE-2025-12913
📋 TL;DR
CVE-2025-12913 is a SQL injection vulnerability in Responsive Hotel Site 1.0 that allows remote attackers to manipulate database queries through the ID parameter in /admin/roomdel.php. This affects all users running the vulnerable version of this hotel management software. Attackers could potentially read, modify, or delete database content.
💻 Affected Systems
- Responsive Hotel Site
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data manipulation, or complete system takeover if database credentials allow privileged access.
Likely Case
Unauthorized data access and potential data modification in the hotel management database, affecting guest records, bookings, and system configuration.
If Mitigated
Limited impact with proper input validation and database permission restrictions, potentially only allowing data reading from specific tables.
🎯 Exploit Status
Exploit details are publicly available on GitHub. Attack requires access to admin interface but no authentication bypass is mentioned.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider implementing input validation and parameterized queries in /admin/roomdel.php.
🔧 Temporary Workarounds
Input Validation and Sanitization
allAdd server-side validation to ensure ID parameter contains only numeric values
Modify /admin/roomdel.php to validate ID parameter: if(!is_numeric($_GET['ID'])) { die('Invalid input'); }
Web Application Firewall Rule
allBlock SQL injection patterns targeting /admin/roomdel.php
WAF rule: Block requests to /admin/roomdel.php containing SQL keywords in ID parameter
🧯 If You Can't Patch
- Restrict access to /admin/ directory using IP whitelisting or authentication
- Implement database user with minimal permissions (read-only where possible)
🔍 How to Verify
Check if Vulnerable:
Test /admin/roomdel.php?ID=1' OR '1'='1 and observe if SQL error or unexpected behavior occurs
Check Version:
Check software version in admin panel or readme files
Verify Fix Applied:
Test with malicious inputs and verify proper error handling or rejection occurs
📡 Detection & Monitoring
Log Indicators:
- Multiple failed SQL queries in web server logs
- Unusual access patterns to /admin/roomdel.php
- SQL error messages in application logs
Network Indicators:
- HTTP requests to /admin/roomdel.php with SQL injection payloads in parameters
- Unusual database query patterns from web server
SIEM Query:
source="web_logs" AND uri="/admin/roomdel.php" AND (param="ID" AND value MATCHES "'.*OR.*|'.*AND.*|'.*UNION.*")