Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15450: SQL Injection in sfturing hosp_order

0
Medium
VulnerabilityCVE-2025-15450cvecve-2025-15450
Published: Mon Jan 05 2026 (01/05/2026, 01:02:07 UTC)
Source: CVE Database V5
Vendor/Project: sfturing
Product: hosp_order

Description

A vulnerability was identified in sfturing hosp_order up to 627f426331da8086ce8fff2017d65b1ddef384f8. Affected by this vulnerability is the function findOrderHosNum of the file /ssm_pro/orderHos/. Such manipulation of the argument hospitalAddress/hospitalName leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/05/2026, 01:43:51 UTC

Technical Analysis

CVE-2025-15450 is a SQL injection vulnerability discovered in the sfturing hosp_order software, a healthcare order management system. The flaw exists in the findOrderHosNum function located in the /ssm_pro/orderHos/ directory, where user-controllable inputs hospitalAddress and hospitalName are improperly sanitized. This lack of input validation allows attackers to inject malicious SQL code remotely, potentially leading to unauthorized data access, modification, or deletion within the backend database. The vulnerability requires no user interaction and no prior authentication, increasing its risk profile. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based with low complexity and no privileges required, but with limited impact on confidentiality, integrity, and availability. The product does not use versioning, complicating identification of affected releases, and the vendor has not provided patches or responded to disclosure efforts. Publicly available exploits increase the risk of exploitation, although no active exploitation has been reported. This vulnerability is critical in healthcare contexts where patient data confidentiality and system integrity are paramount.

Potential Impact

For European organizations, especially those in the healthcare sector using sfturing hosp_order, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive patient records, manipulation of hospital order data, and potential disruption of healthcare services. This compromises patient privacy, violates GDPR regulations, and could result in legal and reputational damage. The ability to execute SQL injection remotely without authentication increases the attack surface, making it easier for threat actors to target healthcare providers. Additionally, the lack of vendor response and absence of patches prolong exposure. The impact extends beyond data breaches to potential operational disruptions if attackers modify or delete critical order information. This could affect hospitals, clinics, and healthcare service providers across Europe, undermining trust in digital healthcare systems.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. First, apply strict input validation and sanitization on hospitalAddress and hospitalName parameters at the application level, ideally using parameterized queries or prepared statements to prevent SQL injection. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting these parameters. Conduct thorough code audits to identify and remediate similar injection points. Network segmentation should isolate the hosp_order system to limit exposure. Monitor logs for suspicious database queries or unusual access patterns. Engage with the vendor for updates and consider migrating to alternative solutions if remediation is delayed. Finally, ensure regular backups and incident response plans are in place to recover from potential data integrity attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-04T08:42:29.942Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695b13fadb813ff03efd5859

Added to database: 1/5/2026, 1:29:30 AM

Last enriched: 1/5/2026, 1:43:51 AM

Last updated: 1/7/2026, 4:12:45 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats