Skip to main content

CVE-2025-5729: SQL Injection in code-projects Health Center Patient Record Management System

Medium
VulnerabilityCVE-2025-5729cvecve-2025-5729
Published: Fri Jun 06 2025 (06/06/2025, 07:00:20 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Health Center Patient Record Management System

Description

A vulnerability, which was classified as critical, was found in code-projects Health Center Patient Record Management System 1.0. Affected is an unknown function of the file /birthing_record.php. The manipulation of the argument itr_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/07/2025, 19:40:27 UTC

Technical Analysis

CVE-2025-5729 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Health Center Patient Record Management System, specifically within an unknown function in the /birthing_record.php file. The vulnerability arises from improper sanitization or validation of the 'itr_no' parameter, which an attacker can manipulate to inject malicious SQL code. This injection flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no known exploits are currently reported in the wild. The CVSS 4.0 score is 5.3 (medium severity), reflecting that the attack vector is network-based with low attack complexity and no privileges or user interaction needed, but with limited impact on confidentiality, integrity, and availability. The vulnerability could potentially allow unauthorized data access, modification, or deletion of sensitive patient records stored within the system, which is critical in healthcare environments. The lack of a patch or mitigation details in the disclosure suggests that affected organizations must proactively implement defensive measures to reduce exposure.

Potential Impact

For European organizations, particularly healthcare providers using the code-projects Health Center Patient Record Management System, this vulnerability poses a significant risk to patient data confidentiality and integrity. Unauthorized access or manipulation of birthing records and other patient information can lead to privacy violations under GDPR, legal liabilities, and loss of patient trust. The healthcare sector is a prime target for cyberattacks due to the sensitivity of data and critical nature of services. Exploitation could disrupt healthcare operations, potentially impacting patient care. Additionally, compromised systems could be leveraged as entry points for broader network intrusions. The medium CVSS score indicates moderate risk, but the critical nature of healthcare data elevates the potential impact. European healthcare institutions must consider this vulnerability a priority for remediation to maintain compliance and protect sensitive health information.

Mitigation Recommendations

Since no official patches are currently available, European healthcare organizations should immediately implement the following specific mitigations: 1) Conduct a thorough code review of the /birthing_record.php file and all input handling related to the 'itr_no' parameter to identify and fix SQL injection flaws by employing parameterized queries or prepared statements. 2) Apply Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection payloads targeting the vulnerable parameter. 3) Restrict database user permissions to the minimum necessary to limit the impact of any successful injection. 4) Monitor application logs and network traffic for unusual query patterns or access attempts to the vulnerable endpoint. 5) Isolate the affected system from external networks where possible until a patch is available. 6) Engage with the vendor or community for updates or patches and plan for timely application once released. 7) Conduct security awareness training for developers and administrators on secure coding practices and vulnerability management. These targeted actions go beyond generic advice by focusing on immediate containment and long-term remediation specific to this vulnerability and healthcare context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-05T12:30:28.633Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6842df031a426642debc9498

Added to database: 6/6/2025, 12:28:51 PM

Last enriched: 7/7/2025, 7:40:27 PM

Last updated: 8/20/2025, 11:16:25 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats