Skip to main content

CVE-2025-3211: SQL Injection in code-projects Patient Record Management System

Medium
VulnerabilityCVE-2025-3211cvecve-2025-3211
Published: Fri Apr 04 2025 (04/04/2025, 05:31:05 UTC)
Source: CVE
Vendor/Project: code-projects
Product: Patient Record Management System

Description

A vulnerability classified as critical has been found in code-projects Patient Record Management System 1.0. This affects an unknown part of the file /birthing_print.php. The manipulation of the argument itr_no/birth_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 06/25/2025, 17:24:08 UTC

Technical Analysis

CVE-2025-3211 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Patient Record Management System, specifically within the /birthing_print.php file. The vulnerability arises from improper sanitization or validation of the input parameters itr_no and birth_id, which are used in SQL queries. An attacker can remotely manipulate these parameters to inject malicious SQL code, potentially altering the intended database queries. This can lead to unauthorized access to sensitive patient data, data modification, or even deletion. The vulnerability does not require user interaction or authentication, making it remotely exploitable over the network. The CVSS 4.0 base score is 5.3, categorized as medium severity, reflecting limited impact on confidentiality, integrity, and availability (each rated low), but with low attack complexity and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The affected system is a Patient Record Management System, which typically stores sensitive healthcare data, making the potential impact significant in healthcare environments. The vulnerability’s exploitation could lead to breaches of patient confidentiality, data integrity issues that may affect clinical decisions, and availability concerns if data is corrupted or deleted. The lack of available patches or vendor advisories at this time necessitates immediate attention from organizations using this software.

Potential Impact

For European organizations, especially healthcare providers using the code-projects Patient Record Management System 1.0, this vulnerability poses a risk to patient data confidentiality and integrity. Exploitation could result in unauthorized disclosure of sensitive health information, violating GDPR and other data protection regulations, potentially leading to legal penalties and reputational damage. Data integrity compromise could affect clinical outcomes if patient records are altered or corrupted. Availability impacts, while rated low, could disrupt healthcare operations if critical patient data becomes inaccessible or corrupted. The medium CVSS score suggests a moderate risk, but the critical nature of healthcare data elevates the practical impact. Organizations in Europe must consider the regulatory environment, where patient data protection is stringent, and breaches can have severe consequences. Additionally, healthcare infrastructure is a known target for cyberattacks, increasing the likelihood of targeted exploitation attempts.

Mitigation Recommendations

1. Immediate mitigation should include implementing input validation and parameterized queries or prepared statements in the /birthing_print.php script to prevent SQL injection. 2. If source code modification is not feasible immediately, deploying a Web Application Firewall (WAF) with custom rules to detect and block malicious SQL injection payloads targeting itr_no and birth_id parameters can reduce exposure. 3. Conduct thorough code audits of all input handling in the Patient Record Management System to identify and remediate similar injection points. 4. Monitor application logs for unusual query patterns or repeated access attempts to the vulnerable endpoint. 5. Restrict network access to the Patient Record Management System to trusted internal networks or VPNs to reduce exposure. 6. Engage with the vendor or community to obtain or request patches or updates addressing this vulnerability. 7. Prepare incident response plans specific to healthcare data breaches, including notification procedures compliant with GDPR. 8. Regularly back up patient data with integrity checks to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-04-03T13:06:36.183Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9839c4522896dcbecfd0

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 5:24:08 PM

Last updated: 7/27/2025, 11:53:28 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats