A vulnerability was found in projectworlds Online Doctor Appointment Booking System 1.0. It has been classified as critical. Affected is an unknown function of the file /patient/patientupdateprofile.php. The manipulation of the argument patientFirstName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
References
Link | Resource |
---|---|
https://github.com/p1026/CVE/issues/19 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.303144 | Permissions Required Third Party Advisory VDB Entry |
https://vuldb.com/?id.303144 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.543845 | Third Party Advisory VDB Entry |
https://github.com/p1026/CVE/issues/19 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
15 Apr 2025, 12:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/p1026/CVE/issues/19 - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.303144 - Permissions Required, Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?id.303144 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.543845 - Third Party Advisory, VDB Entry | |
First Time |
Projectworlds
Projectworlds online Doctor Appointment Booking System Php And Mysql |
|
CPE | cpe:2.3:a:projectworlds:online_doctor_appointment_booking_system_php_and_mysql:1.0:*:*:*:*:*:*:* |
04 Apr 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/p1026/CVE/issues/19 - | |
Summary |
|
03 Apr 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-03 23:15
Updated : 2025-04-15 12:22
NVD link : CVE-2025-3185
Mitre link : CVE-2025-3185
CVE.ORG link : CVE-2025-3185
JSON object : View
Products Affected
projectworlds
- online_doctor_appointment_booking_system_php_and_mysql