Skip to main content

CVE-2025-30058: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in CGM CGM CLININET

Medium
VulnerabilityCVE-2025-30058cvecve-2025-30058cwe-89
Published: Wed Aug 27 2025 (08/27/2025, 10:24:03 UTC)
Source: CVE Database V5
Vendor/Project: CGM
Product: CGM CLININET

Description

In the PatientService.pl service, the "getPatientIdentifier" function is vulnerable to SQL injection through the "pesel" parameter.

AI-Powered Analysis

AILast updated: 08/27/2025, 10:50:11 UTC

Technical Analysis

CVE-2025-30058 is a medium-severity SQL Injection vulnerability identified in the CGM CLININET product, specifically within the PatientService.pl service's "getPatientIdentifier" function. The vulnerability arises from improper neutralization of special elements in SQL commands (CWE-89), allowing an attacker to inject malicious SQL code via the "pesel" parameter. The PESEL is a Polish national identification number, indicating that this parameter is likely used to query patient records. The vulnerability has a CVSS 4.0 base score of 6.9, with the vector AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N, meaning the attack requires adjacent network access (e.g., within the same LAN or VPN), low attack complexity, no user interaction, and low privileges (authenticated user). The impact is high on confidentiality, as the vulnerability could allow unauthorized reading of sensitive patient data. There is no known exploit in the wild and no patch currently available. The affected version is listed as "0," which likely indicates an early or initial version of the software. The vulnerability does not affect integrity or availability directly but poses a significant risk to patient data confidentiality due to potential unauthorized data disclosure via SQL injection. The lack of authentication bypass or user interaction requirements increases the risk within environments where authenticated users have access to the vulnerable service.

Potential Impact

For European organizations, especially healthcare providers using CGM CLININET, this vulnerability poses a significant threat to patient data confidentiality. Exploitation could lead to unauthorized access to sensitive personal health information, violating GDPR regulations and potentially resulting in legal penalties and reputational damage. The use of the PESEL parameter suggests that Polish healthcare institutions are primary targets, but other European countries using CGM CLININET could also be affected. The vulnerability could facilitate data exfiltration, impacting patient privacy and trust. Although the attack requires some level of authenticated access and network proximity, insider threats or compromised credentials could enable exploitation. This risk is heightened in healthcare environments where patient data is critical and tightly regulated. Additionally, the absence of a patch increases exposure time, necessitating immediate mitigation efforts.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the "pesel" parameter to prevent SQL injection, using parameterized queries or prepared statements. 2. Restrict access to the PatientService.pl service to only trusted and authenticated users with the minimum necessary privileges. 3. Employ network segmentation and access controls to limit the ability of attackers to reach the vulnerable service, especially from outside trusted networks. 4. Monitor logs for unusual SQL query patterns or repeated failed attempts to access patient identifiers. 5. Engage with CGM to obtain or request a security patch or update addressing this vulnerability. 6. Conduct a security audit of all web services handling sensitive parameters to identify similar injection flaws. 7. Educate staff on credential security to prevent insider threats and credential compromise. 8. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block SQL injection attempts targeting the "pesel" parameter.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERT-PL
Date Reserved
2025-03-14T14:55:39.571Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68aeded4ad5a09ad006111b5

Added to database: 8/27/2025, 10:32:52 AM

Last enriched: 8/27/2025, 10:50:11 AM

Last updated: 8/28/2025, 12:34:06 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats