Skip to main content

CVE-2025-3173: SQL Injection in Project Worlds Online Lawyer Management System

Medium
VulnerabilityCVE-2025-3173cvecve-2025-3173
Published: Thu Apr 03 2025 (04/03/2025, 18:31:04 UTC)
Source: CVE
Vendor/Project: Project Worlds
Product: Online Lawyer Management System

Description

A vulnerability, which was classified as critical, was found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the file /save_booking.php. The manipulation of the argument lawyer_id/description leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 21:03:29 UTC

Technical Analysis

CVE-2025-3173 is a critical SQL Injection vulnerability identified in version 1.0 of the Project Worlds Online Lawyer Management System, specifically within the /save_booking.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the parameters lawyer_id and description, which are used in SQL queries. An attacker can remotely exploit this flaw by injecting malicious SQL code through these parameters without requiring authentication or user interaction. The injection can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data related to legal case management, client information, and booking records. Although the CVSS 4.0 base score is 6.9 (medium severity), the vulnerability's characteristics—remote exploitation, no authentication required, and direct impact on data confidentiality and integrity—make it a significant threat. The lack of a patch or mitigation guidance at the time of disclosure increases the risk of exploitation. The vulnerability does not require user interaction, and the attack vector is network-based, making it accessible to a wide range of attackers. The exposure of sensitive legal data could have severe consequences for confidentiality, client trust, and regulatory compliance.

Potential Impact

For European organizations, especially law firms and legal service providers using the Project Worlds Online Lawyer Management System, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of confidential client information, case details, and internal communications, violating GDPR and other data protection regulations. The integrity of legal records could be compromised, affecting case outcomes and organizational reputation. Availability impacts could arise if attackers modify or delete booking or case data, disrupting legal operations. Given the critical nature of legal data and the strict regulatory environment in Europe, such breaches could result in significant financial penalties and loss of client trust. Furthermore, the remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation by cybercriminals or state-sponsored actors targeting sensitive legal information.

Mitigation Recommendations

Organizations should immediately audit their use of the Project Worlds Online Lawyer Management System version 1.0 and identify any instances of the vulnerable /save_booking.php endpoint. Until an official patch is released, implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting lawyer_id and description parameters. 2) Apply input validation and sanitization at the application level, ensuring all inputs are strictly validated against expected formats and lengths. 3) Use parameterized queries or prepared statements in the database access layer to prevent injection. 4) Monitor logs for unusual database query patterns or repeated failed attempts to exploit the vulnerability. 5) Restrict access to the vulnerable endpoint via network segmentation or IP whitelisting where feasible. 6) Plan and prioritize upgrading or patching the system as soon as a vendor fix becomes available. 7) Conduct security awareness training for developers and administrators on secure coding practices and vulnerability management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-03T08:26:42.546Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb88c

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 9:03:29 PM

Last updated: 8/11/2025, 2:15:16 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats