Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27264: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in Creativeitem Doctor Appointment Booking

0
Unknown
VulnerabilityCVE-2025-27264cvecve-2025-27264
Published: Mon Mar 03 2025 (03/03/2025, 13:30:29 UTC)
Source: CVE Database V5
Vendor/Project: Creativeitem
Product: Doctor Appointment Booking

Description

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Creativeitem Doctor Appointment Booking doctor-appointment-booking allows PHP Local File Inclusion.This issue affects Doctor Appointment Booking: from n/a through <= 1.0.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 23:02:03 UTC

Technical Analysis

CVE-2025-27264 is a Local File Inclusion (LFI) vulnerability found in the Creativeitem Doctor Appointment Booking software, specifically affecting versions up to 1.0.0. The vulnerability arises from improper control over the filename parameter used in PHP include or require statements, allowing an attacker to manipulate the input to include arbitrary files from the server's filesystem. This can lead to the execution of unintended code or disclosure of sensitive files such as configuration files, password stores, or other critical data. The flaw is rooted in insufficient input validation and sanitization of user-supplied data that controls file inclusion. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely by unauthenticated attackers. Although no known exploits are currently in the wild, the nature of PHP LFI vulnerabilities makes them attractive targets for attackers aiming to escalate privileges, execute arbitrary code, or pivot within a compromised network. The affected product is a niche healthcare appointment booking system, which may be deployed in clinics and hospitals, increasing the risk to sensitive patient data and healthcare operations. The lack of an official patch or fix at the time of disclosure necessitates immediate defensive measures by administrators.

Potential Impact

The impact of CVE-2025-27264 can be severe for organizations using the affected Doctor Appointment Booking software. Exploitation can lead to unauthorized disclosure of sensitive information such as patient records, system configuration files, and credentials, violating confidentiality requirements. Attackers may also execute arbitrary code on the web server, potentially gaining full control over the affected system, leading to integrity and availability compromises. This can disrupt healthcare services, damage organizational reputation, and result in regulatory penalties due to data breaches. Given the healthcare context, the impact extends beyond IT systems to patient safety and trust. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks, especially if the software is internet-facing. Organizations worldwide that rely on this software for appointment management are at risk of targeted attacks aiming to steal data or disrupt operations.

Mitigation Recommendations

To mitigate CVE-2025-27264, organizations should first check for any official patches or updates from Creativeitem and apply them immediately once available. In the absence of patches, administrators should implement strict input validation and sanitization on all parameters controlling file inclusion to ensure only allowed files or paths are processed. Employing a whitelist approach for included files is recommended. Restrict PHP include paths using configuration directives such as open_basedir to limit file system access. Web application firewalls (WAFs) can be configured to detect and block suspicious file inclusion attempts. Regularly audit and monitor server logs for unusual access patterns or errors related to file inclusion. Isolate the affected application in a segmented network zone to limit lateral movement if compromised. Additionally, consider replacing or upgrading the software if it is no longer maintained or supported. Educate developers and administrators on secure coding practices to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-21T16:44:52.127Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72c4e6bfc5ba1deecd53

Added to database: 4/1/2026, 7:32:20 PM

Last enriched: 4/1/2026, 11:02:03 PM

Last updated: 4/5/2026, 4:12:02 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses