Description
A weakness has been identified in SourceCodester/janobe Resort Reservation System 1.0. This issue affects some unknown processing of the file /room_rates.php. This manipulation of the argument q causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to unauthorized data access or modification
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the room_rates.php file of SourceCodester and janobe’s Resort Reservation System 1.0, where the query parameter 'q' is improperly handled, allowing attackers to inject malicious SQL. This flaw enables remote attackers to execute arbitrary SQL statements, potentially exposing, altering, or deleting sensitive reservation data. The weakness aligns with input validation failures (CWE-74) and classic SQL injection (CWE-89).

Affected Systems

Vendors SourceCodester and janobe offer the Resort Reservation System, specifically version 1.0. Users running this release are susceptible to exploitation of the unvalidated 'q' argument in room_rates.php.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate impact, while an EPSS of less than 1 % suggests low likelihood of exploitation at this point. The vulnerability is not listed in CISA’s KEV catalog, but the public availability of an exploit signifies that it could be used if an attacker finds a foothold. Remote exploitation is feasible, and the attacker’s success depends on the presence of the vulnerable file and the ability to supply arbitrary SQL through the 'q' parameter.

Generated by OpenCVE AI on April 16, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or newer release that sanitizes the q parameter in room_rates.php
  • Refactor the code to use parameterized queries or a whitelist for the q input to eliminate direct inclusion of untrusted data in SQL statements
  • Configure a web application firewall or input filtering rule to detect and block suspicious SQL patterns in the q parameter

Generated by OpenCVE AI on April 16, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Janobe
Janobe resort Reservation System
Sourcecodester
Sourcecodester resort Reservation System
Vendors & Products Janobe
Janobe resort Reservation System
Sourcecodester
Sourcecodester resort Reservation System

Mon, 09 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 resort Reservation System
CPEs cpe:2.3:a:oretnom23:resort_reservation_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 resort Reservation System

Mon, 09 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in SourceCodester/janobe Resort Reservation System 1.0. This issue affects some unknown processing of the file /room_rates.php. This manipulation of the argument q causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title SourceCodester/janobe Resort Reservation System room_rates.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Janobe Resort Reservation System
Oretnom23 Resort Reservation System
Sourcecodester Resort Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T15:47:41.474Z

Reserved: 2026-03-08T16:17:53.445Z

Link: CVE-2026-3806

cve-icon Vulnrichment

Updated: 2026-03-10T15:47:23.604Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T06:16:09.300

Modified: 2026-03-09T15:03:27.160

Link: CVE-2026-3806

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses