Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46237: n/a

0
Medium
VulnerabilityCVE-2024-46237cvecve-2024-46237
Published: Wed Oct 09 2024 (10/09/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site Scripting (XSS) via the patname, pataddress, and medhis parameters in doctor/add-patient.php and doctor/edit-patient.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:30:59 UTC

Technical Analysis

CVE-2024-46237 is a Cross Site Scripting (XSS) vulnerability identified in PHPGurukul Hospital Management System version 4.0. The vulnerability arises from insufficient input sanitization of the patname, pataddress, and medhis parameters in the doctor/add-patient.php and doctor/edit-patient.php scripts. These parameters are used to input patient name, address, and medical history, respectively. Because the application fails to properly validate or encode these inputs before rendering them in the web interface, an attacker with authenticated high-privilege access can inject malicious JavaScript code. The CVSS 3.1 vector indicates network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) and user interaction (UI:R), with a scope change (S:C) and limited confidentiality and integrity impact (C:L/I:L), but no availability impact (A:N). This means the attacker must already have a high level of access and trick a user into triggering the malicious script, which can lead to session hijacking, data manipulation, or further compromise of user accounts. Although no public exploits are currently known, the vulnerability poses a risk in environments where the hospital management system is deployed and accessed by multiple users. The CWE-79 classification confirms this is a classic reflected or stored XSS issue. The lack of a patch requires organizations to implement compensating controls until an official fix is released.

Potential Impact

The primary impact of CVE-2024-46237 is the potential compromise of confidentiality and integrity within the affected hospital management system. Attackers exploiting this XSS vulnerability can execute arbitrary scripts in the context of authenticated users, potentially stealing session cookies, impersonating users, or altering patient data displayed in the system. Given the healthcare context, unauthorized access or manipulation of patient records can have serious privacy and compliance implications, including violations of data protection regulations such as HIPAA or GDPR. Although availability is not directly affected, the trustworthiness of the system is undermined, which could disrupt clinical workflows and patient care. The requirement for high privileges and user interaction reduces the ease of exploitation but does not eliminate the risk, especially in environments with multiple users and shared access. Organizations worldwide using PHPGurukul Hospital Management System or similar platforms face risks of targeted attacks aiming to gain sensitive medical information or disrupt healthcare operations.

Mitigation Recommendations

To mitigate CVE-2024-46237, organizations should immediately implement strict input validation and output encoding on the patname, pataddress, and medhis parameters to prevent malicious script injection. Employ context-aware encoding (e.g., HTML entity encoding) before rendering user-supplied data in the web interface. Restrict access to the affected pages to only trusted, authenticated users with necessary privileges and monitor user activities for suspicious behavior indicative of XSS exploitation attempts. Deploy web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting these parameters. Conduct regular security assessments and code reviews focusing on input handling in the hospital management system. Until an official patch is released, consider isolating the application environment and educating users about the risks of clicking on untrusted links or executing unknown scripts. Additionally, implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts within the application context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfab7ef31ef0b56aa45

Added to database: 2/25/2026, 9:43:22 PM

Last enriched: 2/26/2026, 8:30:59 AM

Last updated: 4/12/2026, 9:10:34 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses