In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://github.com/IvanT7D3/CVE-2025-44203/tree/main | Third Party Advisory |
https://github.com/IvanT7D3/CVE-2025-44203/tree/main | Third Party Advisory |
https://www.hoteldruid.com/ | Product |
Configurations
Configuration 1 (hide)
|
History
26 Jun 2025, 14:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.hoteldruid.com/ - Product | |
References | () https://github.com/IvanT7D3/CVE-2025-44203/tree/main - Third Party Advisory | |
CPE | cpe:2.3:a:digitaldruid:hoteldruid:3.0.7:*:*:*:*:*:*:* cpe:2.3:a:digitaldruid:hoteldruid:3.0.0:*:*:*:*:*:*:* |
|
First Time |
Digitaldruid hoteldruid
Digitaldruid |
20 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-20 16:15
Updated : 2025-06-26 14:35
NVD link : CVE-2025-44203
Mitre link : CVE-2025-44203
JSON object : View
Products Affected
digitaldruid
- hoteldruid
CWE
No CWE.