Plattform
php
Komponente
wecodex-hotel-cms
Behoben in
1.0.1
CVE-2018-25195 describes a SQL injection vulnerability discovered in Wecodex Hotel CMS versions 1.0. This flaw allows unauthenticated attackers to bypass authentication and potentially gain unauthorized access to the system. The vulnerability lies within the admin login functionality and can be exploited by injecting malicious SQL code through the username parameter. A fix is available; upgrading is the recommended course of action.
An attacker exploiting CVE-2018-25195 can bypass the authentication mechanism of the Wecodex Hotel CMS admin panel. By injecting malicious SQL code through the username parameter in POST requests to index.php with action=processlogin, an attacker can manipulate database queries. This manipulation can lead to the extraction of sensitive database information, including user credentials, customer data, and potentially financial records. Successful exploitation could also grant the attacker unauthorized administrative access, allowing them to modify system configurations, add or delete users, and compromise the entire system. The blast radius extends to all data stored within the Hotel CMS database.
CVE-2018-25195 was published on 2026-03-26. Its severity is rated as HIGH with a CVSS score of 8.2. Public proof-of-concept (POC) code may exist, increasing the likelihood of exploitation. The vulnerability is not currently listed on KEV or EPSS, suggesting a low to medium probability of active exploitation at this time. Monitor security advisories and threat intelligence feeds for any indications of exploitation campaigns targeting Wecodex Hotel CMS.
Hotels and hospitality businesses utilizing Wecodex Hotel CMS version 1.0 are at direct risk. Specifically, those with publicly accessible instances of the CMS and those lacking robust input validation practices are particularly vulnerable. Shared hosting environments where multiple websites share the same server resources are also at increased risk, as a compromise of one website could potentially lead to the compromise of others.
• php: Examine access logs for POST requests to index.php?action=processlogin containing unusual characters or SQL keywords in the username parameter.
grep -i 'SELECT|UNION|INSERT|DELETE|UPDATE' /var/log/apache2/access.log | grep 'index.php?action=processlogin'• generic web: Use curl to test the login endpoint with various SQL injection payloads in the username parameter and observe the response for errors or unexpected behavior.
curl -X POST -d "username='; DROP TABLE users;--&password=password" http://your-hotel-cms/index.php?action=processlogin• database (mysql): If database access is possible, check for unauthorized user accounts or modified database schemas that could indicate compromise.
disclosure
Exploit-Status
EPSS
0.40% (60% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2018-25195 is to upgrade to a patched version of Wecodex Hotel CMS. Unfortunately, no specific fixed version is listed. If upgrading is not immediately feasible, consider implementing temporary workarounds. Input validation on the username field is essential; strictly limit the allowed characters and length. A Web Application Firewall (WAF) configured to detect and block SQL injection attempts targeting the index.php endpoint can provide an additional layer of defense. Monitor login attempts for suspicious patterns and unusual SQL queries. Sigma or YARA rules can be developed to detect malicious payloads targeting the username parameter. After applying mitigation, verify the fix by attempting a login with a deliberately crafted SQL injection payload; it should be blocked.
Actualizar a una versión parcheada o aplicar las medidas de seguridad recomendadas por el proveedor para mitigar la vulnerabilidad de inyección SQL. Se recomienda contactar al proveedor para obtener un parche específico o instrucciones detalladas.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2018-25195 is a SQL injection vulnerability in Wecodex Hotel CMS version 1.0 that allows attackers to bypass authentication and potentially gain unauthorized access to the system.
If you are using Wecodex Hotel CMS version 1.0, you are potentially affected by this vulnerability. Upgrade to a patched version as soon as possible.
The recommended fix is to upgrade Wecodex Hotel CMS to a patched version. If upgrading is not immediately possible, implement temporary workarounds like input validation and a WAF.
There is currently no confirmed evidence of active exploitation, but the vulnerability's nature makes it a potential target.
Please refer to the Wecodex website or contact their support for the official advisory regarding CVE-2018-25195.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.