Description
Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the hosting_id parameter. Attackers can send GET requests to the rooms/ajax_refresh_subtotal endpoint with malicious hosting_id values to extract sensitive database information or cause denial of service.
Exploits (1)
exploitdb
WORKING POC
by Ahmet Ümit BAYRAM · textwebappsphp
https://www.exploit-db.com/exploits/46616
References (3)
Core 3
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/46616
Various Sources product
https://www.doditsolutions.com/airbnb-clone-script/
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/homey-bnb-sql-injection-via-ajaxrefreshsubtotal
Scores
CVSS v3
8.2
EPSS
0.0014
EPSS Percentile
34.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-89
Status
published
Products (2)
doditsolutions/airbnb_clone_script
4
Doditsolutions/Homey BNB (Airbnb Clone Script)
V4
Published
Feb 27, 2026
Tracked Since
Feb 28, 2026