Wecodex Hotel CMS 1.0 contains an SQL injection vulnerability in the admin login functionality that allows unauthenticated attackers to bypass authentication by injecting SQL code. Attackers can submit malicious SQL payloads through the username parameter in POST requests to index.php with action=processlogin to extract sensitive database information or gain unauthorized administrative access.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/44729 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/wecodex-hotel-cms-sql-injection-via-admin-login | Third Party Advisory |
| https://www.wecodex.com/item/view/hotel-management-system-in-php-and-mysql/7 | Broken Link |
Configurations
History
No history.
Information
Published : 2026-03-26 12:16
Updated : 2026-03-27 21:00
NVD link : CVE-2018-25195
Mitre link : CVE-2018-25195
CVE.ORG link : CVE-2018-25195
JSON object : View
Products Affected
wecodex
- hotel_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
