Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28320: n/a

0
High
VulnerabilityCVE-2024-28320cvecve-2024-28320
Published: Mon Apr 29 2024 (04/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Direct Object References (IDOR) vulnerability in Hospital Management System 1.0 allows attackers to manipulate user parameters for unauthorized access and modifications via crafted POST request to /patient/edit-user.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:14:13 UTC

Technical Analysis

CVE-2024-28320 is an IDOR vulnerability identified in Hospital Management System 1.0, specifically in the /patient/edit-user.php endpoint. The vulnerability arises because the application fails to properly enforce authorization checks on user-supplied parameters, allowing an authenticated attacker to manipulate these parameters in a crafted POST request to access or modify data belonging to other users without proper permissions. This flaw is categorized under CWE-639, which involves authorization bypass through improper validation of object references. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R), indicating that exploitation is not fully remote or unauthenticated but can be performed by legitimate users abusing insufficient access controls. The CVSS 3.1 score of 7.6 reflects a high severity due to the potential for high confidentiality and integrity impact, as attackers can access or alter sensitive patient information, potentially violating privacy and data integrity. The availability impact is low, suggesting the system remains operational despite the exploit. No patches or known exploits have been reported yet, but the risk remains significant given the sensitive nature of healthcare data and regulatory compliance requirements. The vulnerability underscores the critical need for robust authorization mechanisms in healthcare applications to prevent unauthorized data access and modification.

Potential Impact

The impact of CVE-2024-28320 on organizations is substantial, particularly for healthcare providers relying on Hospital Management System 1.0. Successful exploitation can lead to unauthorized disclosure of sensitive patient information, violating patient privacy and potentially breaching regulations such as HIPAA or GDPR. Integrity of patient records can be compromised, leading to incorrect medical data, which may affect patient care and safety. Although availability impact is low, the reputational damage and legal consequences from data breaches can be severe. Attackers with limited privileges can escalate their access, undermining trust in the healthcare provider's IT systems. The vulnerability also increases the risk of insider threats or malicious users abusing their access. Globally, healthcare organizations face increased scrutiny and regulatory pressure to secure patient data, making this vulnerability a critical concern for compliance and operational security.

Mitigation Recommendations

To mitigate CVE-2024-28320, organizations should implement strict access control checks on all user-supplied parameters, especially in endpoints handling sensitive data like /patient/edit-user.php. Employ server-side authorization validation to ensure users can only access or modify resources they are permitted to. Conduct thorough code reviews and penetration testing focused on IDOR vulnerabilities. If patches become available from the vendor, apply them promptly. In the absence of patches, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious parameter tampering. Implement robust logging and monitoring to detect unusual access patterns or unauthorized modifications. Educate users about the risks of parameter manipulation and enforce the principle of least privilege to limit the scope of potential exploitation. Regularly audit user permissions and session management to prevent privilege escalation. Finally, ensure compliance with healthcare data protection regulations by maintaining strong data governance and incident response plans.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d8cb7ef31ef0b5883dc

Added to database: 2/25/2026, 9:45:48 PM

Last enriched: 2/26/2026, 7:14:13 PM

Last updated: 4/12/2026, 3:44:21 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses