SQL Injection Vulnerability in Projectworlds Online Doctor Appointment Booking System
CVE-2025-3184
Key Information:
- Vendor
- Projectworlds
- Status
- Online Doctor Appointment Booking System
- Vendor
- CVE Published:
- 3 April 2025
Badges
Summary
A significant vulnerability exists within the Projectworlds Online Doctor Appointment Booking System 1.0, specifically affecting the processing of the '/patient/profile.php?patientId=1' file. This issue arises from the manipulation of the 'patientFirstName' parameter, which can lead to SQL injection. This means that attackers may exploit this vulnerability to execute malicious SQL queries remotely, potentially compromising sensitive data stored within the system. Given that other parameters could also be at risk, it is crucial for users of this system to implement immediate security measures and updates.
Affected Version(s)
Online Doctor Appointment Booking System 1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved