CVE-2025-4739

7.3 HIGH

📋 TL;DR

CVE-2025-4739 is a critical SQL injection vulnerability in ProjectWorlds Hospital Database Management System 1.0 that allows remote attackers to execute arbitrary SQL commands via the Med_ID parameter in medicines_info.php. This affects all deployments of version 1.0, potentially compromising patient data and hospital operations.

💻 Affected Systems

Products:
  • ProjectWorlds Hospital Database Management System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.0 are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to patient data theft, system takeover, and potential ransomware deployment across hospital infrastructure.

🟠

Likely Case

Unauthorized access to sensitive medical records, manipulation of medication data, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to specific tables.

🌐 Internet-Facing: HIGH - Attack can be initiated remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit but external threat is primary concern.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub, making attacks trivial for attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative hospital management systems or implementing custom fixes with parameterized queries.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to reject non-numeric Med_ID values

Add PHP validation: if(!is_numeric($_GET['Med_ID'])) { die('Invalid input'); }

Web Application Firewall Rules

all

Block SQL injection patterns targeting medicines_info.php

WAF rule: deny requests to /medicines_info.php containing SQL keywords in parameters

🧯 If You Can't Patch

  • Isolate the system behind a firewall with strict IP whitelisting
  • Implement database-level permissions restricting user to SELECT-only operations

🔍 How to Verify

Check if Vulnerable:

Test with payload: medicines_info.php?Med_ID=1' OR '1'='1

Check Version:

Check PHP files for version comments or project documentation

Verify Fix Applied:

Test with same payload - should return error or no data instead of executing SQL

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SQL queries in database logs
  • Unusual parameter values in web server logs for medicines_info.php

Network Indicators:

  • HTTP requests to medicines_info.php with SQL keywords in parameters

SIEM Query:

source=web_logs AND uri_path="/medicines_info.php" AND (param_value="*' OR*" OR param_value="*UNION*" OR param_value="*SELECT*" OR param_value="*--*" OR param_value="*;*" OR param_value="*/*")

🔗 References

📤 Share & Export