CVE-2025-15127

7.3 HIGH

📋 TL;DR

This CVE describes an SQL injection vulnerability in FantasticLBP Hotels_Server's Room.php API endpoint. Attackers can exploit the hotelId parameter to execute arbitrary SQL commands remotely. All deployments up to commit 67b44df162fab26df209bd5d5d542875fcbec1d0 are affected.

💻 Affected Systems

Products:
  • FantasticLBP Hotels_Server
Versions: All versions up to commit 67b44df162fab26df209bd5d5d542875fcbec1d0
Operating Systems: Any OS running the software
Default Config Vulnerable: ⚠️ Yes
Notes: Rolling release model means no specific version numbers; vulnerability exists in all deployments before the fix commit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, modification, deletion, and potential remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, privilege escalation, and potential data exfiltration from the hotels database.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit disclosed publicly; SQL injection via hotelId parameter requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Check GitHub repository for updates beyond commit 67b44df162fab26df209bd5d5d542875fcbec1d0.

🔧 Temporary Workarounds

Input Validation Filter

all

Add strict input validation for hotelId parameter to accept only expected data types

Modify /controller/api/Room.php to validate hotelId as integer using is_numeric() or similar

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns

Add WAF rule: Detect SQL keywords in hotelId parameter

🧯 If You Can't Patch

  • Isolate the Hotels_Server instance behind a reverse proxy with strict input filtering
  • Implement database-level controls: restrict application database user permissions to SELECT only

🔍 How to Verify

Check if Vulnerable:

Test /controller/api/Room.php endpoint with SQL injection payloads in hotelId parameter

Check Version:

git log --oneline -1

Verify Fix Applied:

Verify input validation prevents SQL injection attempts and returns proper error responses

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts from single IP
  • Unexpected database queries

Network Indicators:

  • HTTP requests to /controller/api/Room.php with SQL keywords in parameters
  • Unusual outbound database connections

SIEM Query:

source="web_logs" AND uri="/controller/api/Room.php" AND (param="hotelId" AND value CONTAINS "UNION" OR value CONTAINS "SELECT" OR value CONTAINS "--")

🔗 References

📤 Share & Export