Description
Wecodex Hotel CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows unauthenticated attackers to bypass authentication by injecting SQL code. Attackers can submit malicious SQL payloads through the username parameter in POST requests to index.php with action=processlogin to extract sensitive database information or gain unauthorized administrative access.
Published: 2026-03-26
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Administrative access bypass
Action: Patch now
AI Analysis

Impact

The login routine of Wecodex Hotel CMS 1.0 permits an attacker to inject arbitrary SQL code through the username field sent in a POST request to index.php?action=processlogin. This flaw allows unauthenticated users to bypass authentication, elevate privileges to the administrative interface, and potentially retrieve or modify sensitive data. The weakness aligns with the common SQL injection category identified by CWE-89.

Affected Systems

Only installations of Wecodex Hotel CMS version 1.0 are known to suffer from this vulnerability; no other versions are reported as affected.

Risk and Exploitability

The base CVSS score of 8.8 demonstrates a high‑severity risk. No EPSS score is available. Exploitation can occur remotely over the public web interface without any prior authentication and requires only network access to the server. Although it is not included in CISA's catalog of known exploited vulnerabilities, the attack could compromise confidentiality, integrity, and availability of the system.

Generated by OpenCVE AI on March 26, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch for Wecodex Hotel CMS 1.0
  • If a patch is unavailable, restrict the login page to trusted IP ranges with a firewall or reverse proxy
  • Implement input validation and parameterized queries in the login function to prevent SQL injection
  • Disable detailed error messages on the login page to reduce information disclosure

Generated by OpenCVE AI on March 26, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Wecodex
Wecodex wecodex Hotel Cms
Vendors & Products Wecodex
Wecodex wecodex Hotel Cms

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Wecodex Hotel CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows unauthenticated attackers to bypass authentication by injecting SQL code. Attackers can submit malicious SQL payloads through the username parameter in POST requests to index.php with action=processlogin to extract sensitive database information or gain unauthorized administrative access.
Title Wecodex Hotel CMS 1.0 SQL Injection via Admin Login
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Wecodex Wecodex Hotel Cms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-26T11:39:48.998Z

Reserved: 2026-03-06T12:00:30.883Z

Link: CVE-2018-25195

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T12:16:04.467

Modified: 2026-03-26T15:13:15.790

Link: CVE-2018-25195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T08:36:10Z

Weaknesses