Impact
The flaw lies in an unfiltered parameter within the administrative interface, specifically the ID argument of /admin/mod_amenities/index.php?view=editpic. By supplying a crafted value, an attacker can inject arbitrary SQL commands. The injected code could expose, modify, or delete sensitive reservation data. The vulnerability is exploitable from the Internet without any pre‑existing credentials.
Affected Systems
The affected application is itsourcecode Free Hotel Reservation System, version 1.0. The specific component impacted is the administrative file mentioned above. Users running this version with default configurations are exposed to the risk.
Risk and Exploitability
The CVSS score of 5.3 places the issue in the moderate severity range. EPSS data is not available, so the exploitation probability remains uncertain, but the presence of a publicly available exploit script increases the likelihood of real‑world attacks. The vulnerability is not listed in CISA's KEV catalog, yet attackers can reach it remotely by sending a crafted HTTP request to the vulnerable endpoint.
OpenCVE Enrichment