Skip to main content

CVE-2024-51360: n/a in n/a

Critical
VulnerabilityCVE-2024-51360cvecve-2024-51360
Published: Fri May 23 2025 (05/23/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

An issue in Hospital Management System In PHP V4.0 allows a remote attacker to execute arbitrary code via the hms/doctor/edit-profile.php file

AI-Powered Analysis

AILast updated: 07/08/2025, 19:59:00 UTC

Technical Analysis

CVE-2024-51360 is a critical remote code execution (RCE) vulnerability affecting Hospital Management System In PHP version 4.0. The vulnerability exists in the 'hms/doctor/edit-profile.php' file, which allows an unauthenticated remote attacker to execute arbitrary code on the affected system. The underlying weakness corresponds to CWE-94, which is Improper Control of Generation of Code ('Code Injection'). This indicates that the application fails to properly validate or sanitize user-supplied input before using it in code execution contexts, such as eval() or similar functions. The CVSS v3.1 base score is 9.8, reflecting a critical severity with the following vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network without any privileges or user interaction, and successful exploitation results in complete compromise of confidentiality, integrity, and availability of the system. The vulnerability is particularly dangerous because it targets a healthcare application managing sensitive patient and operational data, potentially allowing attackers to manipulate medical records, disrupt hospital operations, or deploy ransomware. No patches or vendor advisories are currently available, and no known exploits have been reported in the wild yet. However, the critical nature and ease of exploitation make it a high priority for immediate attention by organizations using this software. Given the lack of vendor information and product details, it is likely a niche or less widely known Hospital Management System implemented in PHP, but its presence in healthcare environments makes it a significant threat vector.

Potential Impact

For European organizations, especially hospitals and healthcare providers using this Hospital Management System, the impact of exploitation is severe. Attackers gaining remote code execution can access and exfiltrate sensitive patient data protected under GDPR, leading to regulatory fines and reputational damage. They can also alter or delete medical records, potentially endangering patient safety. The availability impact is critical as attackers could disrupt hospital operations by deploying ransomware or deleting critical files, causing delays in patient care and emergency response. The integrity and confidentiality breaches could undermine trust in healthcare providers and lead to legal liabilities. Furthermore, healthcare infrastructure is often targeted by nation-state actors and cybercriminal groups in Europe, increasing the risk of targeted attacks leveraging this vulnerability. The lack of authentication and user interaction requirements means that attackers can exploit this vulnerability at scale, increasing the risk of widespread impact across multiple European healthcare institutions if the software is in use.

Mitigation Recommendations

1. Immediate mitigation should include isolating and monitoring any systems running the affected Hospital Management System to detect suspicious activity. 2. Since no official patch is available, organizations should conduct a thorough code review of the 'hms/doctor/edit-profile.php' file to identify and neutralize unsafe code execution functions such as eval(), system(), or passthru() that process user input. 3. Implement strict input validation and sanitization on all user-supplied data, especially in the affected script, to prevent code injection. 4. Employ Web Application Firewalls (WAFs) with custom rules to block malicious payloads targeting this endpoint. 5. Restrict network access to the application to trusted internal networks where possible, reducing exposure. 6. Monitor logs for unusual requests to the edit-profile.php endpoint and signs of exploitation attempts. 7. Prepare incident response plans specific to healthcare data breaches and ransomware attacks. 8. Engage with the software vendor or community to obtain or develop patches and updates. 9. Consider migrating to alternative, actively maintained hospital management solutions if remediation is not feasible in the short term.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 68308bb60acd01a249273c2f

Added to database: 5/23/2025, 2:52:38 PM

Last enriched: 7/8/2025, 7:59:00 PM

Last updated: 7/30/2025, 4:09:13 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats