CVE-2025-3347
📋 TL;DR
A critical SQL injection vulnerability in code-projects Patient Record Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter in /dental_pending.php. This affects all users running the vulnerable version of this healthcare management software.
💻 Affected Systems
- code-projects Patient Record Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including patient record exfiltration, authentication bypass, and potential remote code execution if database permissions allow.
Likely Case
Unauthorized access to patient records, data theft, and potential database manipulation.
If Mitigated
Limited impact with proper input validation and database permission restrictions.
🎯 Exploit Status
Exploit details are publicly available on GitHub, making this easily weaponizable.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider workarounds or migrating to alternative software.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize the ID parameter before processing
Modify /dental_pending.php to validate ID parameter as integer using is_numeric() or similar function
WAF Rule Implementation
allDeploy web application firewall rules to block SQL injection patterns
Add WAF rule: deny requests with SQL keywords in ID parameter
🧯 If You Can't Patch
- Isolate the system from internet access and restrict to internal network only
- Implement strict network segmentation and monitor all database access attempts
🔍 How to Verify
Check if Vulnerable:
Test /dental_pending.php with SQL injection payloads in ID parameter (e.g., ID=1' OR '1'='1)
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Verify input validation prevents SQL injection attempts and returns proper error handling
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts following SQL injection patterns
Network Indicators:
- HTTP requests to /dental_pending.php with SQL keywords in parameters
SIEM Query:
source="web_logs" AND uri_path="/dental_pending.php" AND (param="ID" AND value MATCHES "(?i)(union|select|insert|delete|update|drop|exec|or|and)")