A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1
Description
A vulnerability, which was classified as critical, has been found in code-projects Online Appointment Booking System 1
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability, identified as CVE-2025-7744, has been discovered in Dolusoft Omaspot software. This flaw, a type of SQL Injection, allows an unauthenticated attacker to execute arbitrary commands on the application's database, potentially leading to complete data theft, modification, or system compromise. Due to its critical severity (CVSS 9.8), immediate patching is required to prevent exploitation.
Vulnerability Details
CVE-ID: CVE-2025-7744
Affected Software: Dolusoft Omaspot
Affected Versions: Versions prior to 12.09.2025
Vulnerability: The vulnerability is an Improper Neutralization of Special Elements used in an SQL Command, commonly known as SQL Injection. The application fails to properly sanitize user-supplied input before using it in a database query. An attacker can exploit this by crafting a malicious input string that includes SQL commands, which are then executed by the back-end database, granting the attacker unauthorized access and control over the database.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a severe and direct impact on the business. An attacker could exfiltrate, modify, or delete sensitive data, including customer information, financial records, and intellectual property. This could lead to significant financial loss, severe reputational damage, regulatory fines for data breaches, and a complete loss of data integrity and availability, causing major operational disruption.
Remediation Plan
Immediate Action: Immediately update all instances of Dolusoft Omaspot to version 12.09.2025 or later, as recommended by the vendor. After patching, review application and database access logs for any signs of compromise or suspicious activity that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring of web server and application logs, specifically looking for anomalous SQL queries containing keywords such as
UNION,SELECT,DROP,--, or other common SQL injection patterns. Monitor for unusual database connections or high-volume query activity originating from the application server. A Web Application Firewall (WAF) can also be configured to detect and block SQL injection attempts in real-time.Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with a strict ruleset designed to block SQL injection attacks as a temporary measure. Additionally, ensure the application's database service account adheres to the principle of least privilege, limiting its permissions to only what is absolutely necessary for application functionality, thereby reducing the potential impact of a successful exploit.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Sep 16, 2025, there are no known public proof-of-concept exploits or active attacks targeting this vulnerability. However, given the common nature of SQL injection flaws and the critical severity score, it is highly likely that threat actors will develop exploits in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability represents a significant risk to the organization and must be addressed with the highest priority. We strongly recommend that all affected Dolusoft Omaspot instances be patched immediately. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime target for opportunistic attackers, and it should be treated as an active threat.