CVE-2025-6135
📋 TL;DR
This critical SQL injection vulnerability in Projectworlds Life Insurance Management System 1.0 allows attackers to manipulate database queries through the /insertNominee.php endpoint. Attackers can potentially read, modify, or delete sensitive insurance data including client information and policy details. Organizations using this specific version of the software are affected.
💻 Affected Systems
- Projectworlds Life Insurance Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data theft, data destruction, or full system takeover through privilege escalation
Likely Case
Unauthorized access to sensitive client data, policy information, and potential manipulation of insurance records
If Mitigated
Limited data exposure if proper input validation and database permissions are in place
🎯 Exploit Status
Public exploit code available on GitHub, SQL injection is straightforward to exploit
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing custom fixes with proper input validation and parameterized queries.
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rules
allImplement WAF rules to block SQL injection patterns targeting /insertNominee.php
Access Restriction
allRestrict access to /insertNominee.php endpoint using network controls or authentication
🧯 If You Can't Patch
- Implement strict input validation and parameterized queries in the application code
- Deploy the system behind a reverse proxy with SQL injection protection rules
🔍 How to Verify
Check if Vulnerable:
Test the /insertNominee.php endpoint with SQL injection payloads targeting client_id and nominee_id parameters
Check Version:
Check application version in admin panel or configuration files
Verify Fix Applied:
Verify that SQL injection attempts no longer succeed and that parameterized queries are implemented
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in application logs
- Multiple failed SQL injection attempts
- Unexpected database access patterns
Network Indicators:
- HTTP requests to /insertNominee.php with SQL keywords in parameters
- Unusual database traffic from web server
SIEM Query:
source="web_logs" AND uri="/insertNominee.php" AND (param="client_id" OR param="nominee_id") AND (query="SELECT" OR query="UNION" OR query="OR 1=1")
🔗 References
- https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_client_id.md
- https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_nominee_id.md
- https://vuldb.com/?ctiid.312604
- https://vuldb.com/?id.312604
- https://vuldb.com/?submit.592840
- https://vuldb.com/?submit.592841