CVE-2025-5762: SQL Injection in code-projects Patient Record Management System
A vulnerability, which was classified as critical, was found in code-projects Patient Record Management System 1.0. Affected is an unknown function of the file view_hematology.php. The manipulation of the argument itr_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5762 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Patient Record Management System, specifically within an unknown function in the file view_hematology.php. The vulnerability arises from improper sanitization or validation of the 'itr_no' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an attacker to remotely execute arbitrary SQL commands on the backend database without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability is classified with a CVSS 4.0 base score of 5.3, which is medium severity, reflecting that while the attack vector is network-based and requires no user interaction, it does require low privileges and has limited impact on confidentiality, integrity, and availability. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability could allow unauthorized access to sensitive patient data, modification or deletion of records, or potentially database compromise depending on the database privileges of the application. The lack of available patches or mitigations from the vendor at this time increases the urgency for organizations using this system to implement compensating controls.
Potential Impact
For European organizations, particularly healthcare providers using the affected Patient Record Management System version 1.0, this vulnerability poses a significant risk to patient data confidentiality and integrity. Unauthorized SQL injection attacks could lead to exposure of sensitive medical records, violating GDPR requirements and resulting in legal and reputational consequences. Data manipulation could disrupt clinical workflows and patient care. The remote exploitability without user interaction or authentication increases the threat surface, especially for systems exposed to the internet or insufficiently segmented networks. Given the critical nature of healthcare data and the strict regulatory environment in Europe, exploitation could lead to substantial financial penalties and loss of patient trust. Additionally, the public disclosure of the exploit code may encourage opportunistic attackers to target vulnerable installations, increasing the likelihood of attacks.
Mitigation Recommendations
Since no official patches are currently available, European organizations should immediately implement the following mitigations: 1) Conduct a thorough inventory to identify all instances of the affected Patient Record Management System version 1.0. 2) Restrict network access to the application, limiting exposure to trusted internal networks only, and block external access to the view_hematology.php endpoint if possible. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'itr_no' parameter. 4) Implement strict input validation and sanitization at the application or proxy level to reject malicious input. 5) Monitor logs for unusual database queries or errors indicative of injection attempts. 6) Plan and prioritize upgrading to a patched or newer version once available or consider migrating to alternative systems with better security posture. 7) Educate IT and security teams about the vulnerability and ensure incident response plans are updated to handle potential exploitation. 8) Regularly back up patient data securely to enable recovery in case of data corruption or deletion.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-5762: SQL Injection in code-projects Patient Record Management System
Description
A vulnerability, which was classified as critical, was found in code-projects Patient Record Management System 1.0. Affected is an unknown function of the file view_hematology.php. The manipulation of the argument itr_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5762 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Patient Record Management System, specifically within an unknown function in the file view_hematology.php. The vulnerability arises from improper sanitization or validation of the 'itr_no' parameter, which can be manipulated by an attacker to inject malicious SQL code. This injection flaw allows an attacker to remotely execute arbitrary SQL commands on the backend database without requiring user interaction or authentication, as indicated by the CVSS vector. The vulnerability is classified with a CVSS 4.0 base score of 5.3, which is medium severity, reflecting that while the attack vector is network-based and requires no user interaction, it does require low privileges and has limited impact on confidentiality, integrity, and availability. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability could allow unauthorized access to sensitive patient data, modification or deletion of records, or potentially database compromise depending on the database privileges of the application. The lack of available patches or mitigations from the vendor at this time increases the urgency for organizations using this system to implement compensating controls.
Potential Impact
For European organizations, particularly healthcare providers using the affected Patient Record Management System version 1.0, this vulnerability poses a significant risk to patient data confidentiality and integrity. Unauthorized SQL injection attacks could lead to exposure of sensitive medical records, violating GDPR requirements and resulting in legal and reputational consequences. Data manipulation could disrupt clinical workflows and patient care. The remote exploitability without user interaction or authentication increases the threat surface, especially for systems exposed to the internet or insufficiently segmented networks. Given the critical nature of healthcare data and the strict regulatory environment in Europe, exploitation could lead to substantial financial penalties and loss of patient trust. Additionally, the public disclosure of the exploit code may encourage opportunistic attackers to target vulnerable installations, increasing the likelihood of attacks.
Mitigation Recommendations
Since no official patches are currently available, European organizations should immediately implement the following mitigations: 1) Conduct a thorough inventory to identify all instances of the affected Patient Record Management System version 1.0. 2) Restrict network access to the application, limiting exposure to trusted internal networks only, and block external access to the view_hematology.php endpoint if possible. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'itr_no' parameter. 4) Implement strict input validation and sanitization at the application or proxy level to reject malicious input. 5) Monitor logs for unusual database queries or errors indicative of injection attempts. 6) Plan and prioritize upgrading to a patched or newer version once available or consider migrating to alternative systems with better security posture. 7) Educate IT and security teams about the vulnerability and ensure incident response plans are updated to handle potential exploitation. 8) Regularly back up patient data securely to enable recovery in case of data corruption or deletion.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-05T21:57:21.580Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6842e15f1a426642debd4c9c
Added to database: 6/6/2025, 12:38:55 PM
Last enriched: 7/7/2025, 6:42:43 PM
Last updated: 8/5/2025, 4:20:40 AM
Views: 12
Related Threats
CVE-2025-8831: Stack-based Buffer Overflow in Linksys RE6250
HighCVE-2025-8829: OS Command Injection in Linksys RE6250
MediumCVE-2025-8828: OS Command Injection in Linksys RE6250
MediumCVE-2025-8827: OS Command Injection in Linksys RE6250
MediumCVE-2025-8826: Stack-based Buffer Overflow in Linksys RE6250
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.