CVE-2025-44203
Publication date 20 June 2025
Last updated 25 June 2025
Ubuntu priority
Cvss 3 Severity Score
Description
In HotelDruid 3.0.7, an unauthenticated attacker can exploit verbose SQL error messages on creadb.php before the 'create database' button is pressed. By sending malformed POST requests to this endpoint, the attacker may obtain the administrator username, password hash, and salt. In some cases, the attack results in a Denial of Service (DoS), preventing the administrator from logging in even with the correct credentials.
Status
| Package | Ubuntu Release | Status | 
|---|---|---|
| hoteldruid | 25.10 questing | 
                              
                               
                                Needs evaluation 
                                
                               
                             |      
                          
                            
                          
                        
                      
| 25.04 plucky | 
                              
                               
                                Needs evaluation 
                                
                               
                             |      
                          
                            
                          
                        
                      |
| 24.04 LTS noble | 
                              
                               
                                Needs evaluation 
                                
                               
                             |      
                          
                            
                          
                        
                      |
| 22.04 LTS jammy | 
                              
                               
                                Needs evaluation 
                                
                               
                             |      
                          
                            
                          
                        
                      |
| 20.04 LTS focal | 
                              
                               
                                Needs evaluation 
                                
                               
                             |      
                          
                            
                          
                        
                      |
| 18.04 LTS bionic | 
                              
                               
                                Needs evaluation 
                                
                               
                             |      
                          
                            
                          
                        
                      |
| 16.04 LTS xenial | 
                              
                               
                                Needs evaluation 
                                
                               
                             |      
                          
                            
                          
                        
                      
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 
                      
                      
                         | 
                  
| Attack vector | Network | 
| Attack complexity | Low | 
| Privileges required | None | 
| User interaction | None | 
| Scope | Unchanged | 
| Confidentiality | None | 
| Integrity impact | None | 
| Availability impact | High | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |