Description
A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /hotel/admin/login.php of the component Parameter Handler. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerability exists in the admin login page of the Free Hotel Reservation System where the email field is not appropriately validated, allowing attackers to inject arbitrary SQL commands. This flaw permits the compromise of the database’s confidentiality and integrity, enabling unauthorized read, modification, or deletion of data. The weakness arises from improper input handling typical of input‑dropped injection flaws.

Affected Systems

The issue affects the 1.0 release of the Free Hotel Reservation System produced by itsourcecode. The vulnerable code resides in the /hotel/admin/login.php file and is present in installations that have not applied a newer version. Users running this specific version remain exposed.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, yet the flaw can be exploited from a remote location. A publicly available exploit has been released, suggesting active exploitation attempts. Although no EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, the combination of remote accessibility and public exploit elevates real‑world risk.

Generated by OpenCVE AI on April 5, 2026 at 10:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a newer version that addresses the SQL injection in the login page.
  • If no update is available, restrict access to the /hotel/admin/login.php endpoint by limiting it to trusted IP ranges or disabling it entirely.
  • Implement input validation and sanitization for the email field, or refactor the query to use prepared statements.

Generated by OpenCVE AI on April 5, 2026 at 10:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 08:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. This vulnerability affects unknown code of the file /hotel/admin/login.php of the component Parameter Handler. The manipulation of the argument email results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Title itsourcecode Free Hotel Reservation System Parameter login.php sql injection
First Time appeared Itsourcecode
Itsourcecode free Hotel Reservation System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:itsourcecode:free_hotel_reservation_system:*:*:*:*:*:*:*:*
Vendors & Products Itsourcecode
Itsourcecode free Hotel Reservation System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Free Hotel Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T15:29:46.790Z

Reserved: 2026-04-04T13:34:24.375Z

Link: CVE-2026-5551

cve-icon Vulnrichment

Updated: 2026-04-06T15:29:42.815Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T09:16:17.767

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:03Z

Weaknesses