Skip to main content

CVE-2025-4813: SQL Injection in PHPGurukul Human Metapneumovirus Testing Management System

Medium
VulnerabilityCVE-2025-4813cvecve-2025-4813
Published: Fri May 16 2025 (05/16/2025, 21:31:08 UTC)
Source: CVE
Vendor/Project: PHPGurukul
Product: Human Metapneumovirus Testing Management System

Description

A vulnerability, which was classified as critical, was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. Affected is an unknown function of the file /edit-phlebotomist.php. The manipulation of the argument mobilenumber leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 21:20:11 UTC

Technical Analysis

CVE-2025-4813 is a SQL Injection vulnerability identified in version 1.0 of the PHPGurukul Human Metapneumovirus Testing Management System, specifically within the /edit-phlebotomist.php file. The vulnerability arises from improper sanitization or validation of the 'mobilenumber' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an unauthenticated remote attacker to execute arbitrary SQL commands against the backend database without requiring user interaction or privileges. The vulnerability is classified with a CVSS 4.0 base score of 6.9, indicating a medium severity level, primarily due to limited impact on confidentiality, integrity, and availability (each rated low). The attack vector is network-based with low attack complexity and no required authentication or user interaction, making exploitation feasible. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. The affected system is a specialized healthcare management application used for managing Human Metapneumovirus testing data, which likely stores sensitive patient and operational data. The vulnerability could allow attackers to extract, modify, or delete sensitive information, potentially disrupting healthcare operations and compromising patient privacy. The lack of available patches or mitigations at the time of disclosure further exacerbates the risk.

Potential Impact

For European organizations, particularly healthcare providers and laboratories using the PHPGurukul Human Metapneumovirus Testing Management System, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to sensitive patient health data, violating GDPR and other data protection regulations, resulting in legal and financial penalties. Data integrity could be compromised, leading to incorrect test results or patient records, which may affect clinical decisions and patient safety. Availability impacts, while rated low, could still disrupt testing workflows if attackers modify or delete critical data. The healthcare sector is a high-value target in Europe, and any breach could erode public trust and damage organizational reputation. Additionally, the remote and unauthenticated nature of the vulnerability increases the likelihood of attacks, especially in environments where the system is exposed to the internet or insufficiently segmented networks.

Mitigation Recommendations

Immediate mitigation should focus on input validation and sanitization of the 'mobilenumber' parameter within the /edit-phlebotomist.php script. Organizations should implement parameterized queries or prepared statements to prevent SQL injection. Network-level controls such as web application firewalls (WAFs) can be configured to detect and block SQL injection patterns targeting this endpoint. Access to the management system should be restricted via VPN or IP whitelisting to reduce exposure. Regular security assessments and code reviews should be conducted to identify similar injection points. Since no official patches are currently available, organizations should engage with the vendor for updates or consider temporary compensating controls such as disabling the vulnerable functionality if feasible. Logging and monitoring should be enhanced to detect suspicious database queries or unusual activity related to the 'mobilenumber' parameter. Finally, organizations should ensure backups are current and tested to enable recovery in case of data tampering or loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-16T08:54:11.748Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba48

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 9:20:11 PM

Last updated: 8/14/2025, 4:00:10 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats