CVE-2021-35387: n/a in n/a
Hospital Management System v 4.0 is vulnerable to SQL Injection via file:hospital/hms/admin/view-patient.php.
AI Analysis
Technical Summary
CVE-2021-35387 is a high-severity SQL Injection vulnerability identified in Hospital Management System version 4.0, specifically within the file hospital/hms/admin/view-patient.php. SQL Injection (CWE-89) vulnerabilities occur when untrusted input is improperly sanitized and directly incorporated into SQL queries, allowing attackers to manipulate the database queries executed by the application. In this case, the vulnerability allows an attacker with at least some level of privileges (PR:L - Privileges Required: Low) to execute arbitrary SQL commands remotely (AV:N - Attack Vector: Network) without requiring user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) of the system, meaning an attacker could exfiltrate sensitive patient data, modify or delete records, or disrupt system operations. The CVSS 3.1 base score is 8.8, reflecting the high impact and relatively low complexity of exploitation. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a hospital management system is critical due to the sensitivity of healthcare data and the essential nature of healthcare services. The lack of vendor or product details and absence of available patches increases the risk, as organizations may be unaware or unable to remediate promptly. The vulnerability was reserved in June 2021 and published in October 2022, indicating it has been known for some time, but the absence of patch links suggests remediation may not be widely available or communicated yet.
Potential Impact
For European organizations, particularly healthcare providers using Hospital Management System v4.0 or similar vulnerable platforms, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive patient health information, violating GDPR and other data protection regulations, resulting in legal and financial penalties. Data integrity could be compromised, leading to incorrect patient records, which may cause medical errors and endanger patient safety. Availability impacts could disrupt hospital operations, delaying critical care and emergency responses. The reputational damage from a breach could erode patient trust and lead to long-term financial consequences. Given the critical role of healthcare infrastructure in Europe and the increasing targeting of healthcare by cybercriminals and nation-state actors, this vulnerability could be leveraged in targeted attacks or ransomware campaigns. The lack of known exploits does not diminish the urgency, as attackers may develop exploits given the publicly available vulnerability details.
Mitigation Recommendations
European healthcare organizations should immediately conduct an inventory to identify any deployments of Hospital Management System v4.0 or related vulnerable software components. Since no official patches are currently linked, organizations should implement compensating controls such as: 1) Applying strict input validation and parameterized queries or prepared statements in the affected application code to prevent SQL Injection. 2) Employing Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable endpoint. 3) Restricting access to the admin/view-patient.php page to trusted IP addresses and enforcing strong authentication and authorization controls to limit privilege escalation. 4) Monitoring database and application logs for unusual query patterns or access anomalies indicative of exploitation attempts. 5) Segmentation of the hospital network to isolate critical systems and minimize lateral movement in case of compromise. 6) Engaging with the software vendor or community to obtain or develop patches or updates. Additionally, organizations should review and enhance incident response plans to quickly address potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2021-35387: n/a in n/a
Description
Hospital Management System v 4.0 is vulnerable to SQL Injection via file:hospital/hms/admin/view-patient.php.
AI-Powered Analysis
Technical Analysis
CVE-2021-35387 is a high-severity SQL Injection vulnerability identified in Hospital Management System version 4.0, specifically within the file hospital/hms/admin/view-patient.php. SQL Injection (CWE-89) vulnerabilities occur when untrusted input is improperly sanitized and directly incorporated into SQL queries, allowing attackers to manipulate the database queries executed by the application. In this case, the vulnerability allows an attacker with at least some level of privileges (PR:L - Privileges Required: Low) to execute arbitrary SQL commands remotely (AV:N - Attack Vector: Network) without requiring user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H) of the system, meaning an attacker could exfiltrate sensitive patient data, modify or delete records, or disrupt system operations. The CVSS 3.1 base score is 8.8, reflecting the high impact and relatively low complexity of exploitation. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a hospital management system is critical due to the sensitivity of healthcare data and the essential nature of healthcare services. The lack of vendor or product details and absence of available patches increases the risk, as organizations may be unaware or unable to remediate promptly. The vulnerability was reserved in June 2021 and published in October 2022, indicating it has been known for some time, but the absence of patch links suggests remediation may not be widely available or communicated yet.
Potential Impact
For European organizations, particularly healthcare providers using Hospital Management System v4.0 or similar vulnerable platforms, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive patient health information, violating GDPR and other data protection regulations, resulting in legal and financial penalties. Data integrity could be compromised, leading to incorrect patient records, which may cause medical errors and endanger patient safety. Availability impacts could disrupt hospital operations, delaying critical care and emergency responses. The reputational damage from a breach could erode patient trust and lead to long-term financial consequences. Given the critical role of healthcare infrastructure in Europe and the increasing targeting of healthcare by cybercriminals and nation-state actors, this vulnerability could be leveraged in targeted attacks or ransomware campaigns. The lack of known exploits does not diminish the urgency, as attackers may develop exploits given the publicly available vulnerability details.
Mitigation Recommendations
European healthcare organizations should immediately conduct an inventory to identify any deployments of Hospital Management System v4.0 or related vulnerable software components. Since no official patches are currently linked, organizations should implement compensating controls such as: 1) Applying strict input validation and parameterized queries or prepared statements in the affected application code to prevent SQL Injection. 2) Employing Web Application Firewalls (WAFs) configured to detect and block SQL Injection attempts targeting the vulnerable endpoint. 3) Restricting access to the admin/view-patient.php page to trusted IP addresses and enforcing strong authentication and authorization controls to limit privilege escalation. 4) Monitoring database and application logs for unusual query patterns or access anomalies indicative of exploitation attempts. 5) Segmentation of the hospital network to isolate critical systems and minimize lateral movement in case of compromise. 6) Engaging with the software vendor or community to obtain or develop patches or updates. Additionally, organizations should review and enhance incident response plans to quickly address potential exploitation scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2021-06-23T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd954d
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 12:28:00 PM
Last updated: 8/15/2025, 12:36:13 AM
Views: 13
Related Threats
CVE-2025-3495: CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Delta Electronics COMMGR
CriticalCVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.