CVE-2025-3173: SQL Injection in Project Worlds Online Lawyer Management System
A vulnerability, which was classified as critical, was found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the file /save_booking.php. The manipulation of the argument lawyer_id/description leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-3173 is a critical SQL Injection vulnerability identified in version 1.0 of the Project Worlds Online Lawyer Management System, specifically within the /save_booking.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the parameters lawyer_id and description, which are used in SQL queries. An attacker can remotely exploit this flaw by injecting malicious SQL code through these parameters without requiring authentication or user interaction. The injection can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data related to legal case management, client information, and booking records. Although the CVSS 4.0 base score is 6.9 (medium severity), the vulnerability's characteristics—remote exploitation, no authentication required, and direct impact on data confidentiality and integrity—make it a significant threat. The lack of a patch or mitigation guidance at the time of disclosure increases the risk of exploitation. The vulnerability does not require user interaction, and the attack vector is network-based, making it accessible to a wide range of attackers. The exposure of sensitive legal data could have severe consequences for confidentiality, client trust, and regulatory compliance.
Potential Impact
For European organizations, especially law firms and legal service providers using the Project Worlds Online Lawyer Management System, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of confidential client information, case details, and internal communications, violating GDPR and other data protection regulations. The integrity of legal records could be compromised, affecting case outcomes and organizational reputation. Availability impacts could arise if attackers modify or delete booking or case data, disrupting legal operations. Given the critical nature of legal data and the strict regulatory environment in Europe, such breaches could result in significant financial penalties and loss of client trust. Furthermore, the remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation by cybercriminals or state-sponsored actors targeting sensitive legal information.
Mitigation Recommendations
Organizations should immediately audit their use of the Project Worlds Online Lawyer Management System version 1.0 and identify any instances of the vulnerable /save_booking.php endpoint. Until an official patch is released, implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting lawyer_id and description parameters. 2) Apply input validation and sanitization at the application level, ensuring all inputs are strictly validated against expected formats and lengths. 3) Use parameterized queries or prepared statements in the database access layer to prevent injection. 4) Monitor logs for unusual database query patterns or repeated failed attempts to exploit the vulnerability. 5) Restrict access to the vulnerable endpoint via network segmentation or IP whitelisting where feasible. 6) Plan and prioritize upgrading or patching the system as soon as a vendor fix becomes available. 7) Conduct security awareness training for developers and administrators on secure coding practices and vulnerability management.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-3173: SQL Injection in Project Worlds Online Lawyer Management System
Description
A vulnerability, which was classified as critical, was found in Project Worlds Online Lawyer Management System 1.0. Affected is an unknown function of the file /save_booking.php. The manipulation of the argument lawyer_id/description leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-3173 is a critical SQL Injection vulnerability identified in version 1.0 of the Project Worlds Online Lawyer Management System, specifically within the /save_booking.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the parameters lawyer_id and description, which are used in SQL queries. An attacker can remotely exploit this flaw by injecting malicious SQL code through these parameters without requiring authentication or user interaction. The injection can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive data related to legal case management, client information, and booking records. Although the CVSS 4.0 base score is 6.9 (medium severity), the vulnerability's characteristics—remote exploitation, no authentication required, and direct impact on data confidentiality and integrity—make it a significant threat. The lack of a patch or mitigation guidance at the time of disclosure increases the risk of exploitation. The vulnerability does not require user interaction, and the attack vector is network-based, making it accessible to a wide range of attackers. The exposure of sensitive legal data could have severe consequences for confidentiality, client trust, and regulatory compliance.
Potential Impact
For European organizations, especially law firms and legal service providers using the Project Worlds Online Lawyer Management System, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of confidential client information, case details, and internal communications, violating GDPR and other data protection regulations. The integrity of legal records could be compromised, affecting case outcomes and organizational reputation. Availability impacts could arise if attackers modify or delete booking or case data, disrupting legal operations. Given the critical nature of legal data and the strict regulatory environment in Europe, such breaches could result in significant financial penalties and loss of client trust. Furthermore, the remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation by cybercriminals or state-sponsored actors targeting sensitive legal information.
Mitigation Recommendations
Organizations should immediately audit their use of the Project Worlds Online Lawyer Management System version 1.0 and identify any instances of the vulnerable /save_booking.php endpoint. Until an official patch is released, implement the following mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting lawyer_id and description parameters. 2) Apply input validation and sanitization at the application level, ensuring all inputs are strictly validated against expected formats and lengths. 3) Use parameterized queries or prepared statements in the database access layer to prevent injection. 4) Monitor logs for unusual database query patterns or repeated failed attempts to exploit the vulnerability. 5) Restrict access to the vulnerable endpoint via network segmentation or IP whitelisting where feasible. 6) Plan and prioritize upgrading or patching the system as soon as a vendor fix becomes available. 7) Conduct security awareness training for developers and administrators on secure coding practices and vulnerability management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-04-03T08:26:42.546Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb88c
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 9:03:29 PM
Last updated: 8/11/2025, 2:15:16 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.