CVE-2025-10798

A vulnerability was identified in code-projects Hostel Management System 1.0. Impacted is an unknown function of the file /justines/admin/mod_roomtype/index.php?view=view. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
References
Link Resource
https://code-projects.org/ Product
https://github.com/598600/CVE/issues/1 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.325155 Permissions Required VDB Entry
https://vuldb.com/?id.325155 Third Party Advisory VDB Entry
https://vuldb.com/?submit.654092 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:angeljudesuarez:hostel_management_system:1.0:*:*:*:*:*:*:*

History

25 Sep 2025, 19:15

Type Values Removed Values Added
CPE cpe:2.3:a:angeljudesuarez:hostel_management_system:1.0:*:*:*:*:*:*:*
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://github.com/598600/CVE/issues/1 - () https://github.com/598600/CVE/issues/1 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.325155 - () https://vuldb.com/?ctiid.325155 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.325155 - () https://vuldb.com/?id.325155 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.654092 - () https://vuldb.com/?submit.654092 - Third Party Advisory, VDB Entry
First Time Angeljudesuarez hostel Management System
Angeljudesuarez

22 Sep 2025, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-22 13:16

Updated : 2025-09-25 19:15


NVD link : CVE-2025-10798

Mitre link : CVE-2025-10798

CVE.ORG link : CVE-2025-10798


JSON object : View

Products Affected

angeljudesuarez

  • hostel_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')