Skip to main content

CVE-2025-4895: SQL Injection in SourceCodester Doctors Appointment System

Medium
VulnerabilityCVE-2025-4895cvecve-2025-4895
Published: Sun May 18 2025 (05/18/2025, 20:31:05 UTC)
Source: CVE
Vendor/Project: SourceCodester
Product: Doctors Appointment System

Description

A vulnerability, which was classified as critical, has been found in SourceCodester Doctors Appointment System 1.0. This issue affects some unknown processing of the file /admin/delete-session.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:18:50 UTC

Technical Analysis

CVE-2025-4895 is a SQL Injection vulnerability identified in SourceCodester Doctors Appointment System version 1.0. The vulnerability resides in the /admin/delete-session.php file, specifically in the handling of the 'ID' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the system then executes on the backend database. This flaw allows remote attackers to execute arbitrary SQL commands without authentication or user interaction, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability is classified with a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (remote), with low attack complexity and no privileges or user interaction required. The impact on confidentiality, integrity, and availability is limited but present, as the vulnerability allows partial compromise of the database. No known public exploits have been reported yet, but the vulnerability details have been disclosed publicly, increasing the risk of exploitation. The lack of available patches or mitigations from the vendor further exacerbates the threat. Given the nature of the affected product—a doctors appointment system—successful exploitation could expose sensitive patient data, disrupt appointment scheduling, or corrupt critical healthcare records, which are highly sensitive and regulated data types.

Potential Impact

For European organizations, especially healthcare providers using the SourceCodester Doctors Appointment System 1.0, this vulnerability poses significant risks. Exploitation could lead to unauthorized access to patient information, violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Data integrity issues could disrupt healthcare operations, causing appointment mismanagement or loss of trust in digital health services. Availability impacts, while limited, could still affect service continuity. Given the critical nature of healthcare data and the strict regulatory environment in Europe, even a medium severity vulnerability can have outsized consequences. Additionally, healthcare systems are often targeted by threat actors due to the value of medical data and the urgency of healthcare services, increasing the likelihood of targeted attacks. Organizations relying on this system without timely patches or mitigations are at risk of data breaches and operational disruptions.

Mitigation Recommendations

1. Immediate mitigation should include implementing input validation and parameterized queries or prepared statements in the /admin/delete-session.php script to prevent SQL injection. 2. If source code modification is not feasible immediately, deploying a Web Application Firewall (WAF) with custom rules to detect and block SQL injection payloads targeting the 'ID' parameter can reduce risk. 3. Conduct thorough code audits of all input handling in the application to identify and remediate similar injection points. 4. Monitor logs for unusual database query patterns or repeated access attempts to the vulnerable endpoint. 5. Restrict access to the /admin/delete-session.php endpoint via network segmentation or IP whitelisting to limit exposure. 6. Engage with the vendor or community to obtain patches or updates and apply them promptly once available. 7. Educate administrators on the risks and signs of exploitation to enable rapid incident response. 8. Regularly back up databases and ensure backups are secure to enable recovery in case of data corruption or deletion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-17T09:58:49.229Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb7ed

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 8:18:50 PM

Last updated: 8/2/2025, 4:54:46 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats