CVE-2025-3185

A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0. It has been classified as critical. Affected is an unknown function of the file /patient/patientupdateprofile.php. The manipulation of the argument patientFirstName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
References
Link Resource
https://github.com/p1026/CVE/issues/19 Exploit Third Party Advisory
https://vuldb.com/?ctiid.303144 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.303144 Third Party Advisory VDB Entry
https://vuldb.com/?submit.543845 Third Party Advisory VDB Entry
https://github.com/p1026/CVE/issues/19 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*

History

15 Apr 2025, 12:22

Type Values Removed Values Added
References () https://github.com/p1026/CVE/issues/19 - () https://github.com/p1026/CVE/issues/19 - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.303144 - () https://vuldb.com/?ctiid.303144 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.303144 - () https://vuldb.com/?id.303144 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.543845 - () https://vuldb.com/?submit.543845 - Third Party Advisory, VDB Entry
First Time Projectworlds
Projectworlds online Doctor Appointment Booking System Php And Mysql
CPE cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:*

04 Apr 2025, 18:15

Type Values Removed Values Added
References () https://github.com/p1026/CVE/issues/19 - () https://github.com/p1026/CVE/issues/19 -
Summary
  • (es) Se encontró una vulnerabilidad en projectworlds Online Doctor Appointment Booking System 1.0. Se ha clasificado como crítica. Se ve afectada una función desconocida del archivo /patient/patientupdateprofile.php. La manipulación del argumento patientFirstName provoca una inyección SQL. Es posible ejecutar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado. Otros parámetros también podrían verse afectados.

03 Apr 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-03 23:15

Updated : 2025-04-15 12:22


NVD link : CVE-2025-3185

Mitre link : CVE-2025-3185

CVE.ORG link : CVE-2025-3185


JSON object : View

Products Affected

projectworlds

  • online_doctor_appointment_booking_system_php_and_mysql
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')