CVE Alert: CVE-2025-12237 – projectworlds – Advanced Library Management System

CVE-2025-12237

HIGHNo exploitation known

A vulnerability was identified in projectworlds Advanced Library Management System 1.0. Impacted is an unknown function of the file /index.php. Such manipulation of the argument keywords leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.

CVSS v3.1 (7.3)
Vendor
projectworlds
Product
Advanced Library Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-10-27T06:22:49.972Z
Updated
2025-10-27T06:22:49.972Z

AI Summary Analysis

**Risk verdict** High risk: remote SQL injection with a publicly available PoC could be weaponised quickly without authentication.

**Why this matters** The vulnerability can enable leakage or manipulation of data stored in the app’s database, with potential exposure of patron and operational records. While CVSS indicates low impact on availability, the integrity and confidentiality impact remain real, and a focused attacker could alter records or exfiltrate sensitive data. The presence of a public exploit increases the likelihood of opportunistic targeting, especially against institutions hosting the system on public or semi-public web servers.

**Most likely attack path** External attacker sends crafted input through the index.php entry point (keywords parameter) exploiting unsanitised SQL queries. No user interaction or credentials are required, meaning it can be triggered directly over the network. The attack relies on the app’s database permissions; if the web app uses a DB account with sufficient rights, data exfiltration or modification can occur. Public PoC lowers the bar for exploitation and may enable rapid automated attempts.

**Who is most exposed** Educational institutions or libraries deploying Projectworlds Advanced Library Management System 1.0, often on internet-facing servers or shared hosting with basic hardening.

Detection ideas

  • Increased SQL error or database error messages in web server logs.
  • Unusual long or complex query strings in access logs.
  • Requests with suspicious keywords/inputs directed at index.php.
  • Spike in 500/500‑level errors following specific query-like parameters.
  • WAF or IDS signatures matching SQLi patterns.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to patched version as soon as available.
  • Ensure parameterised queries and prepared statements are used; validate inputs server-side.
  • Enforce least-privilege DB accounts for the web app; disable unnecessary write access if feasible.
  • Enable WAF/IPS rules targeting SQLi patterns; deploy monitoring on DB activity and alert on anomalies.
  • Plan rapid patch testing and rollout in staging, then production; if patching is delayed, implement compensating controls and strengthen access logging and anomaly detection.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features