CVE-2025-2065
Published: 07 March 2025
Summary
CVE-2025-2065 is a high-severity Injection (CWE-74) vulnerability in Projectworlds Life Insurance Management System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of untrusted inputs like the agent_id parameter to block SQL injection attacks in /editAgent.php.
Mandates timely identification and correction of the SQL injection flaw in /editAgent.php to eliminate the vulnerability.
Restricts agent_id inputs to authorized types and formats, preventing injection of malicious SQL payloads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in unauthenticated public-facing /editAgent.php enables exploitation of public-facing application (T1190) and data collection from backend databases via arbitrary queries (T1213.006).
NVD Description
A vulnerability, which was classified as critical, was found in projectworlds Life Insurance Management System 1.0. This affects an unknown part of the file /editAgent.php. The manipulation of the argument agent_id leads to sql injection. It is possible to initiate…
more
the attack remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-2065 is a critical SQL injection vulnerability in projectworlds Life Insurance Management System version 1.0, affecting an unknown functionality within the /editAgent.php file. The issue arises from improper handling of the agent_id parameter, classified under CWE-74 and CWE-89. It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), enabling remote exploitation without authentication or user interaction.
Attackers can exploit this vulnerability remotely by manipulating the agent_id parameter in requests to /editAgent.php, potentially leading to unauthorized access, data manipulation, or disruption with low impacts on confidentiality, integrity, and availability. No privileges are required, making it accessible to any unauthenticated remote actor.
Advisories and details are documented in references including a GitHub issue at https://github.com/ubfbuz3/cve/issues/7 and VulDB entries at https://vuldb.com/?ctiid.298821, https://vuldb.com/?id.298821, and https://vuldb.com/?submit.514758. The exploit has been publicly disclosed and may be actively used. No specific patch or mitigation steps are detailed in the available information.
Details
- CWE(s)