Description
A security flaw has been discovered in tushar-2223 Hotel-Management-System up to bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15. This affects an unknown part of the file /home.php of the component HTTP POST Request Handler. Performing a manipulation of the argument Name/Email results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
References (5)
Core 5
Core References
Permissions Required, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.346162
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.346162
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.750080
Various Sources related
https://github.com/Stolichnayer/SQLi-Hotel-Management-System
Scores
CVSS v3
6.3
EPSS
0.0004
EPSS Percentile
12.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-74
CWE-89
Status
published
Products (1)
tushar-2223/Hotel-Management-System
bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15
Published
Feb 16, 2026
Tracked Since
Feb 18, 2026