Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fantasticlbp:hotels_server:*:*:*:*:*:*:*:* |
Mon, 15 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fantasticlbp
Fantasticlbp hotels Server |
|
| Vendors & Products |
Fantasticlbp
Fantasticlbp hotels Server |
Mon, 15 Dec 2025 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in FantasticLBP Hotels Server up to 67b44df162fab26df209bd5d5d542875fcbec1d0. This vulnerability affects unknown code of the file /controller/api/hotelList.php. This manipulation of the argument pickedHotelName/type causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used. This product adopts a rolling release strategy to maintain continuous delivery The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | FantasticLBP Hotels Server hotelList.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-15T16:51:47.313Z
Reserved: 2025-12-14T20:07:17.249Z
Link: CVE-2025-14711
Updated: 2025-12-15T16:50:22.715Z
Status : Analyzed
Published: 2025-12-15T08:15:41.933
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-14711
No data.
OpenCVE Enrichment
Updated: 2025-12-15T14:05:29Z