CVE-2025-2067
Published: 07 March 2025
Description
Adversaries may leverage databases to mine valuable information.
Security Summary
CVE-2025-2067 is a critical SQL injection vulnerability (CWE-74, CWE-89) in projectworlds Life Insurance Management System 1.0. The flaw affects the processing of the /search.php file, where manipulation of the "key" argument enables SQL injection attacks.
Attackers can exploit this vulnerability remotely without authentication or user interaction, requiring only low attack complexity, as reflected in its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Successful exploitation grants limited impacts to confidentiality, integrity, and availability, such as unauthorized data access, modification, or disruption.
Advisories from VulDB (https://vuldb.com/?ctiid.298823, https://vuldb.com/?id.298823, https://vuldb.com/?submit.514762) and a GitHub issue (https://github.com/ubfbuz3/cve/issues/9) document the vulnerability, with the exploit publicly disclosed and available for use.
The public availability of the exploit elevates the risk of real-world attacks against exposed instances of the affected software.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Unauthenticated SQL injection in public-facing /search.php enables exploitation of public-facing applications (T1190) and unauthorized data collection from databases via UNION-based and blind SQLi payloads (T1213.006).