SQL Injection Vulnerability in Projectworlds Online Doctor Appointment Booking System
CVE-2025-3184

6.9MEDIUM

Key Information:

Vendor
Projectworlds
Status
Online Doctor Appointment Booking System
Vendor
CVE Published:
3 April 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant vulnerability exists within the Projectworlds Online Doctor Appointment Booking System 1.0, specifically affecting the processing of the '/patient/profile.php?patientId=1' file. This issue arises from the manipulation of the 'patientFirstName' parameter, which can lead to SQL injection. This means that attackers may exploit this vulnerability to execute malicious SQL queries remotely, potentially compromising sensitive data stored within the system. Given that other parameters could also be at risk, it is crucial for users of this system to implement immediate security measures and updates.

Affected Version(s)

Online Doctor Appointment Booking System 1.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

PKEY (VulDB User)
.