CVE-2025-3181

A vulnerability, which was classified as critical, has been found in projectworlds Online Doctor Appointment Booking System 1.0. Affected by this issue is some unknown functionality of the file /patient/appointment.php?scheduleDate=1&appid=1. The manipulation of the argument scheduleDate leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://github.com/p1026/CVE/issues/15 Exploit Third Party Advisory Issue Tracking
https://vuldb.com/?ctiid.303140 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.303140 Third Party Advisory VDB Entry
https://vuldb.com/?submit.543841 Third Party Advisory VDB Entry
https://github.com/p1026/CVE/issues/15 Exploit Third Party Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*

History

15 Apr 2025, 12:47

Type Values Removed Values Added
First Time Projectworlds
Projectworlds online Doctor Appointment Booking System Php And Mysql
CPE cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*
References () https://github.com/p1026/CVE/issues/15 - () https://github.com/p1026/CVE/issues/15 - Exploit, Third Party Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.303140 - () https://vuldb.com/?ctiid.303140 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.303140 - () https://vuldb.com/?id.303140 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.543841 - () https://vuldb.com/?submit.543841 - Third Party Advisory, VDB Entry

07 Apr 2025, 17:15

Type Values Removed Values Added
References () https://github.com/p1026/CVE/issues/15 - () https://github.com/p1026/CVE/issues/15 -

07 Apr 2025, 14:18

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como crítica en projectworlds Online Doctor Appointment Booking System 1.0. Este problema afecta a una funcionalidad desconocida del archivo /patient/appointment.php?scheduleDate=1&appid=1. La manipulación del argumento "scheduleDate" provoca una inyección SQL. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado.

03 Apr 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-03 22:15

Updated : 2025-04-15 12:47


NVD link : CVE-2025-3181

Mitre link : CVE-2025-3181

CVE.ORG link : CVE-2025-3181


JSON object : View

Products Affected

projectworlds

  • online_doctor_appointment_booking_system_php_and_mysql
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')