Impact
An SQL injection flaw exists in the Inout EasyRooms Ultimate Edition v1.0 application via the numguest parameter of the searchdetailed POST endpoint. The vulnerability stems from lack of input validation, enabling attackers to embed malicious SQL commands. This flaw permits unauthenticated users to bypass authentication mechanisms, retrieve sensitive database content, and modify or delete data. The weakness is classified as CWE‑89.
Affected Systems
The affected product is Inout EasyRooms Ultimate Edition, version 1.0, as identified by the CPE string cpe:2.3:a:inoutscripts:inout_homestay:1.0:*:*:*:ultimate:*:*:*. No other versions are mentioned in the source data, so the impact is specific to the v1.0 release.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires only that the vulnerable endpoint be reachable; no authentication is needed. Attackers can leverage standard HTTP POST requests to inject SQL, implying a remote web-based attack vector.
OpenCVE Enrichment