Description
A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /hotel/admin/mod_amenities/index.php?view=edit. Performing a manipulation of the argument amen_id/rmtype_id results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to potential unauthorized database access and data manipulation
Action: Apply Vendor Patch
AI Analysis

Impact

An unknown function in the file /hotel/admin/mod_amenities/index.php can be manipulated via the amen_id or rmtype_id parameters to perform SQL injection (CWE‑89) caused by improper handling of unvalidated input (CWE‑74). This flaw allows an attacker to send crafted SQL statements to the underlying database, potentially reading, modifying, or deleting reservation data. The vulnerability is exploitable remotely and a public exploit is available, making a compromise of confidential data or service disruption feasible.

Affected Systems

The affected product is itsourcecode Free Hotel Reservation System, version 1.0. No other versions or additional products are listed in the CVE data.

Risk and Exploitability

The CVSS score is 6.9, indicating medium severity. The EPSS score is less than 1%, suggesting a low current probability of exploitation, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The attack vector is remote and would require an attacker to construct a malicious URL or form submission targeting the vulnerable admin endpoint, potentially exploiting the function by providing uncontrolled amen_id or rmtype_id values. An exploit could allow unauthorized data exposure or log modification if the database has sufficient privileges. Based on the data provided, no additional exploitation conditions or prerequisites beyond remote access to the admin interface are stated.

Generated by OpenCVE AI on April 17, 2026 at 12:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor issued patch or upgrade to the latest version of Free Hotel Reservation System that addresses the SQL injection flaw.
  • If a patch is unavailable, restrict network access to the /hotel/admin pathway to trusted IP ranges or VPN endpoints to limit exposure.
  • Sanitize and validate incoming parameters (amen_id, rmtype_id) on the server side, ensuring they are numeric or acceptable against a whitelist to prevent injection.

Generated by OpenCVE AI on April 17, 2026 at 12:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:itsourcecode:free_hotel_reservation_system:1.0:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode free Hotel Reservation System
Vendors & Products Itsourcecode
Itsourcecode free Hotel Reservation System

Sun, 08 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /hotel/admin/mod_amenities/index.php?view=edit. Performing a manipulation of the argument amen_id/rmtype_id results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Title itsourcecode Free Hotel Reservation System index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Free Hotel Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:49:33.079Z

Reserved: 2026-03-07T17:46:56.222Z

Link: CVE-2026-3730

cve-icon Vulnrichment

Updated: 2026-03-11T19:49:29.439Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T11:15:50.087

Modified: 2026-03-09T15:24:11.303

Link: CVE-2026-3730

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses