Description
Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the location parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads in the location field to extract sensitive data or modify database contents.
Published: 2026-03-12
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Immediate Patch
AI Analysis

Impact

An unauthenticated attacker can exploit an SQL injection flaw in Inout EasyRooms Ultimate Edition v1.0 by submitting malicious SQL code through the location parameter on the search/searchdetailed endpoint. This flaw allows the attacker to retrieve sensitive information from the database or alter its contents, leading to potential loss of confidentiality and integrity of the system's data. The vulnerability is categorized as CWE-89, indicating a classic SQL injection weakness.

Affected Systems

The affected product is Inoutscripts Inout EasyRooms Ultimate Edition version 1.0. No additional version ranges are specified, so any deployment running this exact version is vulnerable.

Risk and Exploitability

The CVSS score of 8.8 reflects high severity, and the EPSS score of less than 1% indicates the exploit is not widely observed yet. The vulnerability is not listed in the CISA KEV catalog. Attackers need only send unauthenticated POST requests to the search/searchdetailed endpoint with crafted payloads; no authentication or advanced environment preparation is required. If exploited, an attacker can exfiltrate or modify database content.

Generated by OpenCVE AI on March 19, 2026 at 17:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a newer version of Inout EasyRooms Ultimate Edition that resolves CVE‑2019‑25526.
  • If an immediate upgrade is not feasible, restrict access to the search/searchdetailed endpoint or implement a WAF rule to block suspicious POST requests that contain SQL keywords.
  • Monitor web server logs for abnormal POST traffic to the search endpoint and investigate any anomalies.

Generated by OpenCVE AI on March 19, 2026 at 17:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Inoutscripts inout Homestay
CPEs cpe:2.3:a:inoutscripts:inout_homestay:1.0:*:*:*:ultimate:*:*:*
Vendors & Products Inoutscripts inout Homestay

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Inoutscripts
Inoutscripts inout Easyrooms Ultimate Edition
Vendors & Products Inoutscripts
Inoutscripts inout Easyrooms Ultimate Edition

Thu, 12 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the location parameter. Attackers can send POST requests to the search/searchdetailed endpoint with malicious SQL payloads in the location field to extract sensitive data or modify database contents.
Title Inout EasyRooms Ultimate Edition v1.0 SQL Injection via search
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Inoutscripts Inout Easyrooms Ultimate Edition Inout Homestay
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-12T18:05:40.965Z

Reserved: 2026-03-12T13:57:06.255Z

Link: CVE-2019-25526

cve-icon Vulnrichment

Updated: 2026-03-12T18:05:19.135Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T16:16:06.060

Modified: 2026-03-19T16:24:40.120

Link: CVE-2019-25526

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:49:18Z

Weaknesses