In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.
References
| Link | Resource |
|---|---|
| https://github.com/IvanT7D3/CVE-2025-44203/tree/main | Third Party Advisory |
| https://www.hoteldruid.com/ | Product |
| https://github.com/IvanT7D3/CVE-2025-44203/tree/main | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-06-20 16:15
Updated : 2025-06-26 14:35
NVD link : CVE-2025-44203
Mitre link : CVE-2025-44203
CVE.ORG link : CVE-2025-44203
JSON object : View
Products Affected
digitaldruid
- hoteldruid
