CVE-2025-13170

7.3 HIGH

📋 TL;DR

CVE-2025-13170 is an SQL injection vulnerability in Simple Online Hotel Reservation System 1.0 that allows attackers to manipulate database queries via the admin_id parameter in /admin/edit_account.php. This enables unauthorized data access, modification, or deletion. All systems running the vulnerable version are affected.

💻 Affected Systems

Products:
  • Simple Online Hotel Reservation System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /admin/edit_account.php file specifically. Requires admin access to reach the vulnerable endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including credential theft, data destruction, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized access to sensitive hotel reservation data, guest information, and administrative credentials.

🟢

If Mitigated

Limited data exposure if proper input validation and database permissions are enforced.

🌐 Internet-Facing: HIGH - Attack can be carried out remotely and exploit is public.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if system is accessible on internal network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin authentication but SQL injection is straightforward once authenticated. Public exploit details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Implement workarounds or migrate to alternative software.

🔧 Temporary Workarounds

Input Validation and Parameterized Queries

all

Modify edit_account.php to use prepared statements and validate admin_id parameter

Replace SQL queries with PDO or mysqli prepared statements in PHP code

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns

Configure WAF to block SQL injection patterns for /admin/edit_account.php

🧯 If You Can't Patch

  • Restrict network access to admin interface using firewall rules
  • Implement strong authentication and monitor admin account activity

🔍 How to Verify

Check if Vulnerable:

Check if system uses Simple Online Hotel Reservation System 1.0 and has /admin/edit_account.php file

Check Version:

Check source code or documentation for version information

Verify Fix Applied:

Test admin_id parameter with SQL injection payloads after implementing fixes

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts to admin panel
  • Suspicious admin_id parameter values in web logs

Network Indicators:

  • SQL error messages in HTTP responses
  • Unusual database connection patterns from web server

SIEM Query:

source="web_logs" AND uri="/admin/edit_account.php" AND (param="admin_id" AND value MATCHES "[';]|UNION|SELECT")

🔗 References

📤 Share & Export