CVE-2025-3170

7.3 HIGH

📋 TL;DR

A critical SQL injection vulnerability in Project Worlds Online Lawyer Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the block_id/unblock_id parameters in /admin_user.php. This affects all deployments of version 1.0, potentially enabling data theft, modification, or system compromise.

💻 Affected Systems

Products:
  • Project Worlds Online Lawyer Management System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable. The /admin_user.php endpoint must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data exfiltration, privilege escalation, or remote code execution via database functions.

🟠

Likely Case

Unauthorized data access, modification of legal records, or administrative account takeover.

🟢

If Mitigated

Limited impact if proper input validation and WAF rules are in place, though SQL injection attempts may still be logged.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploit details exist.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this, but external exposure poses greater risk.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to admin_user.php endpoint. Public GitHub issues demonstrate the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider workarounds or migrating to alternative software.

🔧 Temporary Workarounds

Input Validation Filter

all

Add parameter validation to block_id/unblock_id parameters to allow only numeric values

Modify /admin_user.php to add: if(!is_numeric($_GET['block_id'])) { die('Invalid input'); }

WAF Rule Implementation

all

Deploy web application firewall rules to block SQL injection patterns targeting admin_user.php

Add WAF rule: Detect and block requests containing SQL keywords in block_id/unblock_id parameters

🧯 If You Can't Patch

  • Restrict access to /admin_user.php using IP whitelisting or authentication requirements
  • Implement database user with minimal privileges (read-only if possible) for the application

🔍 How to Verify

Check if Vulnerable:

Test by sending SQL injection payloads to /admin_user.php?block_id=1' OR '1'='1

Check Version:

Check system documentation or configuration files for version information

Verify Fix Applied:

Verify that SQL injection attempts return error messages or are blocked without executing

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in web server logs
  • Multiple requests to /admin_user.php with special characters

Network Indicators:

  • HTTP requests containing SQL keywords (UNION, SELECT, etc.) in block_id/unblock_id parameters

SIEM Query:

source="web_logs" AND uri="/admin_user.php" AND (block_id="*'*" OR unblock_id="*'*")

🔗 References

📤 Share & Export