CVE-2025-30058: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in CGM CGM CLININET
In the PatientService.pl service, the "getPatientIdentifier" function is vulnerable to SQL injection through the "pesel" parameter.
AI Analysis
Technical Summary
CVE-2025-30058 is a medium-severity SQL Injection vulnerability identified in the CGM CLININET product, specifically within the PatientService.pl service's "getPatientIdentifier" function. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), allowing an attacker to inject malicious SQL code via the "pesel" parameter. The PESEL is a Polish national identification number, indicating that this parameter is likely used to query patient records. The vulnerability has a CVSS 4.0 base score of 6.9, with the vector AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N, meaning the attack requires adjacent network access (e.g., within the same LAN or VPN), low attack complexity, no user interaction, and low privileges (authenticated user). The impact is high on confidentiality, as the vulnerability could allow unauthorized reading of sensitive patient data. There is no known exploit in the wild and no patch currently available. The affected version is listed as "0," which likely indicates an early or initial version of the software. The vulnerability does not affect integrity or availability directly but poses a significant risk to patient data confidentiality due to potential unauthorized data disclosure via SQL injection. The lack of authentication bypass or user interaction requirements increases the risk within environments where authenticated users have access to the vulnerable service.
Potential Impact
For European organizations, especially healthcare providers using CGM CLININET, this vulnerability poses a significant threat to patient data confidentiality. Exploitation could lead to unauthorized access to sensitive personal health information, violating GDPR regulations and potentially resulting in legal penalties and reputational damage. The use of the PESEL parameter suggests that Polish healthcare institutions are primary targets, but other European countries using CGM CLININET could also be affected. The vulnerability could facilitate data exfiltration, impacting patient privacy and trust. Although the attack requires some level of authenticated access and network proximity, insider threats or compromised credentials could enable exploitation. This risk is heightened in healthcare environments where patient data is critical and tightly regulated. Additionally, the absence of a patch increases exposure time, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Implement strict input validation and sanitization on the "pesel" parameter to prevent SQL injection, using parameterized queries or prepared statements. 2. Restrict access to the PatientService.pl service to only trusted and authenticated users with the minimum necessary privileges. 3. Employ network segmentation and access controls to limit the ability of attackers to reach the vulnerable service, especially from outside trusted networks. 4. Monitor logs for unusual SQL query patterns or repeated failed attempts to access patient identifiers. 5. Engage with CGM to obtain or request a security patch or update addressing this vulnerability. 6. Conduct a security audit of all web services handling sensitive parameters to identify similar injection flaws. 7. Educate staff on credential security to prevent insider threats and credential compromise. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the "pesel" parameter.
Affected Countries
Poland, Germany, France, Italy, Spain, Netherlands
CVE-2025-30058: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in CGM CGM CLININET
Description
In the PatientService.pl service, the "getPatientIdentifier" function is vulnerable to SQL injection through the "pesel" parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-30058 is a medium-severity SQL Injection vulnerability identified in the CGM CLININET product, specifically within the PatientService.pl service's "getPatientIdentifier" function. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), allowing an attacker to inject malicious SQL code via the "pesel" parameter. The PESEL is a Polish national identification number, indicating that this parameter is likely used to query patient records. The vulnerability has a CVSS 4.0 base score of 6.9, with the vector AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N, meaning the attack requires adjacent network access (e.g., within the same LAN or VPN), low attack complexity, no user interaction, and low privileges (authenticated user). The impact is high on confidentiality, as the vulnerability could allow unauthorized reading of sensitive patient data. There is no known exploit in the wild and no patch currently available. The affected version is listed as "0," which likely indicates an early or initial version of the software. The vulnerability does not affect integrity or availability directly but poses a significant risk to patient data confidentiality due to potential unauthorized data disclosure via SQL injection. The lack of authentication bypass or user interaction requirements increases the risk within environments where authenticated users have access to the vulnerable service.
Potential Impact
For European organizations, especially healthcare providers using CGM CLININET, this vulnerability poses a significant threat to patient data confidentiality. Exploitation could lead to unauthorized access to sensitive personal health information, violating GDPR regulations and potentially resulting in legal penalties and reputational damage. The use of the PESEL parameter suggests that Polish healthcare institutions are primary targets, but other European countries using CGM CLININET could also be affected. The vulnerability could facilitate data exfiltration, impacting patient privacy and trust. Although the attack requires some level of authenticated access and network proximity, insider threats or compromised credentials could enable exploitation. This risk is heightened in healthcare environments where patient data is critical and tightly regulated. Additionally, the absence of a patch increases exposure time, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Implement strict input validation and sanitization on the "pesel" parameter to prevent SQL injection, using parameterized queries or prepared statements. 2. Restrict access to the PatientService.pl service to only trusted and authenticated users with the minimum necessary privileges. 3. Employ network segmentation and access controls to limit the ability of attackers to reach the vulnerable service, especially from outside trusted networks. 4. Monitor logs for unusual SQL query patterns or repeated failed attempts to access patient identifiers. 5. Engage with CGM to obtain or request a security patch or update addressing this vulnerability. 6. Conduct a security audit of all web services handling sensitive parameters to identify similar injection flaws. 7. Educate staff on credential security to prevent insider threats and credential compromise. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the "pesel" parameter.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-03-14T14:55:39.571Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68aeded4ad5a09ad006111b5
Added to database: 8/27/2025, 10:32:52 AM
Last enriched: 8/27/2025, 10:50:11 AM
Last updated: 10/18/2025, 4:05:16 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11378: CWE-862 Missing Authorization in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
MediumCVE-2023-28815: Vulnerability in Hikvision iSecure Center
CriticalCVE-2025-62653: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation MediaWiki PollNY extension
LowCVE-2025-62640
UnknownCVE-2025-62639
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.