
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-44203 is a vulnerability discovered in HotelDruid versions 3.0.0 and 3.0.7, disclosed on June 20, 2025. The vulnerability affects the creadb.php endpoint before the 'create database' button is pressed. This security flaw allows an unauthenticated attacker to exploit verbose SQL error messages to obtain sensitive information (NVD, GitHub).
The vulnerability exists in the creadb.php endpoint of HotelDruid's installation process. By sending malformed POST requests to this endpoint before the database creation step, an attacker can exploit verbose SQL error messages to extract sensitive information including administrator username, password hash, and salt. The vulnerability is particularly exploitable when HotelDruid's access is not restricted to localhost during the debian package configuration (GitHub).
The successful exploitation of this vulnerability leads to two main impacts: 1) Disclosure of sensitive information including administrator username, password hash, and salt, which could potentially lead to password recovery through brute force attacks if the password is weak, and 2) A Denial of Service (DoS) condition that prevents the administrator from logging in with their credentials, even when correct (GitHub).
The primary mitigation is to ensure that during HotelDruid debian package configuration, the option 'Restrict HotelDruid access to localhost?' is set to 'Yes'. Additionally, administrators should consider implementing a Web Application Firewall (WAF) to help protect against unauthorized access to the installation endpoints (GitHub).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”