CVE-2025-3173: SQL Injection in Project Worlds Online Lawyer Management System
A vulnerability, which was classified as critical, was found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the file /save_booking.php. The manipulation of the argument lawyer_id/description leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3173 is a critical SQL Injection vulnerability identified in version 1.0 of the Project Worlds Online Lawyer Management System, specifically within the /save_booking.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the parameters lawyer_id and description, which are used in SQL queries. An attacker can remotely exploit this flaw by injecting malicious SQL code through these parameters without requiring authentication or user interaction. The injection can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data related to legal case management, client information, and booking records. Although the CVSS 4.0 base score is 6.9 (medium severity), the vulnerability's characteristics—remote exploitation, no authentication required, and direct impact on data confidentiality and integrity—make it a significant threat. The lack of a patch or mitigation guidance at the time of disclosure increases the risk of exploitation. The vulnerability does not require user interaction, and the attack vector is network-based, making it accessible to a wide range of attackers. The exposure of sensitive legal data could have severe consequences for confidentiality, client trust, and regulatory compliance.
Potential Impact
For European organizations, especially law firms and legal service providers using the Project Worlds Online Lawyer Management System, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of confidential client information, case details, and internal communications, violating GDPR and other data protection regulations. The integrity of legal records could be compromised, affecting case outcomes and organizational reputation. Availability impacts could arise if attackers modify or delete booking or case data, disrupting legal operations. Given the critical nature of legal data and the strict regulatory environment in Europe, such breaches could result in significant financial penalties and loss of client trust. Furthermore, the remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation by cybercriminals or state-sponsored actors targeting sensitive legal information.
Mitigation Recommendations
Organizations should immediately audit their use of the Project Worlds Online Lawyer Management System version 1.0 and identify any instances of the vulnerable /save_booking.php endpoint. Until an official patch is released, implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting lawyer_id and description parameters. 2) Apply input validation and sanitization at the application level, ensuring all inputs are strictly validated against expected formats and lengths. 3) Use parameterized queries or prepared statements in the database access layer to prevent injection. 4) Monitor logs for unusual database query patterns or repeated failed attempts to exploit the vulnerability. 5) Restrict access to the vulnerable endpoint via network segmentation or IP whitelisting where feasible. 6) Plan and prioritize upgrading or patching the system as soon as a vendor fix becomes available. 7) Conduct security awareness training for developers and administrators on secure coding practices and vulnerability management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-3173: SQL Injection in Project Worlds Online Lawyer Management System
Description
A vulnerability, which was classified as critical, was found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the file /save_booking.php. The manipulation of the argument lawyer_id/description leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3173 is a critical SQL Injection vulnerability identified in version 1.0 of the Project Worlds Online Lawyer Management System, specifically within the /save_booking.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the parameters lawyer_id and description, which are used in SQL queries. An attacker can remotely exploit this flaw by injecting malicious SQL code through these parameters without requiring authentication or user interaction. The injection can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data related to legal case management, client information, and booking records. Although the CVSS 4.0 base score is 6.9 (medium severity), the vulnerability's characteristics—remote exploitation, no authentication required, and direct impact on data confidentiality and integrity—make it a significant threat. The lack of a patch or mitigation guidance at the time of disclosure increases the risk of exploitation. The vulnerability does not require user interaction, and the attack vector is network-based, making it accessible to a wide range of attackers. The exposure of sensitive legal data could have severe consequences for confidentiality, client trust, and regulatory compliance.
Potential Impact
For European organizations, especially law firms and legal service providers using the Project Worlds Online Lawyer Management System, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of confidential client information, case details, and internal communications, violating GDPR and other data protection regulations. The integrity of legal records could be compromised, affecting case outcomes and organizational reputation. Availability impacts could arise if attackers modify or delete booking or case data, disrupting legal operations. Given the critical nature of legal data and the strict regulatory environment in Europe, such breaches could result in significant financial penalties and loss of client trust. Furthermore, the remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation by cybercriminals or state-sponsored actors targeting sensitive legal information.
Mitigation Recommendations
Organizations should immediately audit their use of the Project Worlds Online Lawyer Management System version 1.0 and identify any instances of the vulnerable /save_booking.php endpoint. Until an official patch is released, implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting lawyer_id and description parameters. 2) Apply input validation and sanitization at the application level, ensuring all inputs are strictly validated against expected formats and lengths. 3) Use parameterized queries or prepared statements in the database access layer to prevent injection. 4) Monitor logs for unusual database query patterns or repeated failed attempts to exploit the vulnerability. 5) Restrict access to the vulnerable endpoint via network segmentation or IP whitelisting where feasible. 6) Plan and prioritize upgrading or patching the system as soon as a vendor fix becomes available. 7) Conduct security awareness training for developers and administrators on secure coding practices and vulnerability management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-03T08:26:42.546Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb88c
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 9:03:29 PM
Last updated: 10/16/2025, 12:51:14 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.