First published: Wed Mar 05 2025(Updated: )
A vulnerability was found in projectworlds Online Hotel Booking 1.0. It has been rated as critical. This issue affects some unknown processing of the file /booknow.php?roomname=Duplex. The manipulation of the argument checkin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Online Hotel Booking |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1964 has been rated as critical due to its potential for remote SQL injection.
CVE-2025-1964 affects the processing of the checkin argument in the booknow.php file, leading to a vulnerability.
Any users of Projectworlds Online Hotel Booking version 1.0 may be affected by CVE-2025-1964.
Mitigation for CVE-2025-1964 involves patching the Online Hotel Booking application to prevent SQL injection vulnerabilities.
Exploiting CVE-2025-1964 could allow an attacker to execute arbitrary SQL queries on the database.