Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-38813: n/a in n/a

0
High
VulnerabilityCVE-2022-38813cvecve-2022-38813n-acwe-668
Published: Fri Nov 25 2022 (11/25/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

PHPGurukul Blood Donor Management System 1.0 does not properly restrict access to admin/dashboard.php, which allows attackers to access all data of users, delete the users, add and manage Blood Group, and Submit Report.

AI-Powered Analysis

AILast updated: 06/22/2025, 05:21:28 UTC

Technical Analysis

CVE-2022-38813 is a high-severity vulnerability affecting the PHPGurukul Blood Donor Management System version 1.0. The core issue lies in improper access control on the admin/dashboard.php page, which fails to restrict unauthorized users from accessing administrative functionalities. This flaw allows attackers with at least some level of privileges (as indicated by the CVSS vector requiring PR:L, meaning low privileges) to bypass intended access restrictions and gain full administrative control over the system. Specifically, an attacker can view all user data, delete user records, add and manage blood group information, and submit reports. The vulnerability is classified under CWE-668, which relates to improper access control, emphasizing the failure to enforce proper authorization checks. The CVSS 3.1 base score of 8.1 reflects the high impact on confidentiality and integrity, with no impact on availability. The attack vector is network-based (AV:N), requiring no user interaction (UI:N), and the scope remains unchanged (S:U). Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk due to the sensitive nature of the data involved and the administrative privileges that can be gained. The lack of vendor or product-specific details suggests this is a niche or less widely known system, but the impact on any deployed instance is critical due to the sensitive health-related data and operational control exposed.

Potential Impact

For European organizations, particularly healthcare providers, blood banks, and NGOs involved in blood donation management, this vulnerability poses a substantial risk. Unauthorized access to the admin dashboard could lead to exposure of personally identifiable information (PII) and sensitive health data of donors, violating GDPR and other data protection regulations. The ability to delete users or manipulate blood group data could disrupt blood donation operations, potentially affecting patient care and emergency response capabilities. Furthermore, forged or manipulated reports could mislead decision-making processes or regulatory compliance efforts. The breach of confidentiality and integrity could damage organizational reputation, lead to legal penalties, and undermine public trust in healthcare services. Given the critical role of blood donation systems in public health infrastructure, exploitation of this vulnerability could have cascading effects on healthcare delivery and emergency preparedness in affected European countries.

Mitigation Recommendations

Organizations using PHPGurukul Blood Donor Management System 1.0 should immediately audit access controls on the admin/dashboard.php page and implement strict authentication and authorization mechanisms. Specific steps include: 1) Enforce role-based access control (RBAC) ensuring only authorized administrators can access the dashboard; 2) Implement multi-factor authentication (MFA) for admin accounts to reduce risk from compromised credentials; 3) Conduct code reviews to identify and fix all improper access control issues, especially on sensitive endpoints; 4) Monitor and log all access to administrative functions with alerts for suspicious activities; 5) If possible, isolate the admin interface behind VPN or IP whitelisting to limit exposure; 6) Regularly back up data to enable recovery from unauthorized deletions; 7) Engage with the vendor or community for patches or updates addressing this vulnerability; 8) Conduct penetration testing to verify the effectiveness of access controls post-remediation. These measures go beyond generic advice by focusing on access control hardening, monitoring, and operational resilience specific to this system and vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-08-29T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbeff71

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/22/2025, 5:21:28 AM

Last updated: 2/4/2026, 2:34:13 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats