CVE-2025-6133
📋 TL;DR
This critical SQL injection vulnerability in Projectworlds Life Insurance Management System 1.0 allows attackers to execute arbitrary SQL commands via the agent_id parameter in /insertagent.php. Remote attackers can potentially access, modify, or delete database contents. All deployments of version 1.0 are affected.
💻 Affected Systems
- Projectworlds Life Insurance Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, authentication bypass, and potential remote code execution if database permissions allow.
Likely Case
Unauthorized data access and modification of insurance records, agent information, and potentially sensitive customer data.
If Mitigated
Limited impact with proper input validation, parameterized queries, and database permission restrictions in place.
🎯 Exploit Status
Public proof-of-concept available on GitHub. Remote exploitation requires no authentication. Simple SQL injection technique.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Consider migrating to supported software or implementing workarounds.
🔧 Temporary Workarounds
Input Validation Filter
allAdd server-side validation to only accept numeric values for agent_id parameter
Modify /insertagent.php to validate agent_id parameter before processing
WAF Rule Implementation
allDeploy web application firewall rules to block SQL injection patterns
Add WAF rule: deny requests containing SQL keywords in agent_id parameter
🧯 If You Can't Patch
- Implement network segmentation to isolate the system from untrusted networks
- Deploy database monitoring to detect unusual SQL queries and access patterns
🔍 How to Verify
Check if Vulnerable:
Test /insertagent.php endpoint with SQL injection payloads in agent_id parameter (e.g., agent_id=1' OR '1'='1)
Check Version:
Check system documentation or about page for version information
Verify Fix Applied:
Verify that SQL injection payloads no longer execute and return appropriate error messages
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts following SQL injection patterns
- Unexpected database queries from web server
Network Indicators:
- HTTP requests to /insertagent.php with SQL keywords in parameters
- Unusual database traffic patterns from web server
SIEM Query:
source="web_logs" AND uri="/insertagent.php" AND (param="agent_id" AND value MATCHES "(?i)(union|select|insert|update|delete|drop|exec|or|and)")
🔗 References
- https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertAgent.php_agent_id.md
- https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertAgent.php_agent_id.md#poc
- https://vuldb.com/?ctiid.312602
- https://vuldb.com/?id.312602
- https://vuldb.com/?submit.592838