Cyber Posture

CVE-2025-2065

HighPublic PoC

Published: 07 March 2025

Published
07 March 2025
Modified
14 May 2025
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0007 21.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2065 is a high-severity Injection (CWE-74) vulnerability in Projectworlds Life Insurance Management System. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted inputs like the agent_id parameter to block SQL injection attacks in /editAgent.php.

prevent

Mandates timely identification and correction of the SQL injection flaw in /editAgent.php to eliminate the vulnerability.

prevent

Restricts agent_id inputs to authorized types and formats, preventing injection of malicious SQL payloads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in unauthenticated public-facing /editAgent.php enables exploitation of public-facing application (T1190) and data collection from backend databases via arbitrary queries (T1213.006).

NVD Description

A vulnerability, which was classified as critical, was found in projectworlds Life Insurance Management System 1.0. This affects an unknown part of the file /editAgent.php. The manipulation of the argument agent_id leads to sql injection. It is possible to initiate…

more

the attack remotely. The exploit has been disclosed to the public and may be used.

Deeper analysisAI

CVE-2025-2065 is a critical SQL injection vulnerability in projectworlds Life Insurance Management System version 1.0, affecting an unknown functionality within the /editAgent.php file. The issue arises from improper handling of the agent_id parameter, classified under CWE-74 and CWE-89. It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), enabling remote exploitation without authentication or user interaction.

Attackers can exploit this vulnerability remotely by manipulating the agent_id parameter in requests to /editAgent.php, potentially leading to unauthorized access, data manipulation, or disruption with low impacts on confidentiality, integrity, and availability. No privileges are required, making it accessible to any unauthenticated remote actor.

Advisories and details are documented in references including a GitHub issue at https://github.com/ubfbuz3/cve/issues/7 and VulDB entries at https://vuldb.com/?ctiid.298821, https://vuldb.com/?id.298821, and https://vuldb.com/?submit.514758. The exploit has been publicly disclosed and may be actively used. No specific patch or mitigation steps are detailed in the available information.

Details

CWE(s)

Affected Products

projectworlds
life insurance management system
1.0

CVEs Like This One

CVE-2025-2067Same product: Projectworlds Life Insurance Management System
CVE-2025-2062Same product: Projectworlds Life Insurance Management System
CVE-2025-2066Same product: Projectworlds Life Insurance Management System
CVE-2025-2064Same product: Projectworlds Life Insurance Management System
CVE-2025-2063Same product: Projectworlds Life Insurance Management System
CVE-2025-2657Same vendor: Projectworlds
CVE-2025-2661Same vendor: Projectworlds
CVE-2025-2662Same vendor: Projectworlds
CVE-2025-1962Same vendor: Projectworlds
CVE-2025-1965Same vendor: Projectworlds

References