Inout EasyRooms Ultimate Edition v1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the guests parameter. Attackers can send POST requests to the search/rentals endpoint with malicious SQL payloads to bypass authentication, extract sensitive data, or modify database contents.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46630 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/inout-easyrooms-ultimate-edition-sql-injection-via-search-2 | Third Party Advisory |
Configurations
History
19 Mar 2026, 16:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/46630 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/inout-easyrooms-ultimate-edition-sql-injection-via-search-2 - Third Party Advisory | |
| Summary |
|
|
| First Time |
Inoutscripts
Inoutscripts inout Homestay |
|
| CPE | cpe:2.3:a:inoutscripts:inout_homestay:1.0:*:*:*:ultimate:*:*:* |
12 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 16:16
Updated : 2026-03-19 16:24
NVD link : CVE-2019-25525
Mitre link : CVE-2019-25525
CVE.ORG link : CVE-2019-25525
JSON object : View
Products Affected
inoutscripts
- inout_homestay
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
