VYPR
High severity7.3NVD Advisory· Published Sep 17, 2025· Updated Apr 29, 2026

CVE-2025-10623

CVE-2025-10623

Description

A vulnerability was identified in SourceCodester Hotel Reservation System 1.0. The impacted element is an unknown function of the file deleteuser.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SourceCodester Hotel Reservation System 1.0 is vulnerable to unauthenticated SQL injection in deleteuser.php, allowing remote attackers to compromise the database.

Overview

The SourceCodester Hotel Reservation System version 1.0 contains a SQL injection vulnerability in the deleteuser.php file [1]. The root cause is insufficient validation of the id parameter, which is directly concatenated into SQL queries without sanitization [1]. This bug allows an attacker to inject arbitrary SQL code through the id argument [1].

Exploitation

The vulnerability can be exploited remotely without any authentication or authorization [1]. The id parameter is the attack surface, and the vulnerability type is time-based blind SQL injection [1]. This means an attacker can send crafted payloads via HTTP requests to the deleteuser.php endpoint to extract information even without visible error output [1].

Impact

Successful exploitation grants an attacker unauthorized access to the underlying database [1]. Potential consequences include data leakage, modification or deletion of sensitive records, and, in worst cases, full system compromise or service interruption [1]. The vendor homepage is referenced as sourcecodester.com [2], but no patch has been publicly released.

Mitigation

As of the publication date (2025-09-17), no fix has been provided by the vendor [1]. Users of the affected product should treat the system as compromised, apply input sanitization to the id parameter, and consider isolating the application until a patch is available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.