Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60736: n/a

0
Critical
VulnerabilityCVE-2025-60736cvecve-2025-60736
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

code-projects Online Medicine Guide 1.0 is vulnerable to SQL Injection in /login.php via the upass parameter.

AI-Powered Analysis

AILast updated: 12/09/2025, 20:13:14 UTC

Technical Analysis

CVE-2025-60736 identifies a critical SQL Injection vulnerability in the Online Medicine Guide 1.0 application, affecting the /login.php endpoint through the 'upass' parameter. SQL Injection (CWE-89) vulnerabilities occur when untrusted input is improperly sanitized and directly incorporated into SQL queries, allowing attackers to manipulate the database queries executed by the application. In this case, the 'upass' parameter, presumably used for password input during login, is vulnerable to injection, enabling attackers to execute arbitrary SQL commands remotely without authentication or user interaction. The CVSS 3.1 score of 9.8 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality (C), integrity (I), and availability (A). Exploiting this flaw could allow attackers to bypass authentication, extract sensitive patient data, modify or delete records, or disrupt service availability. Although no public exploits are currently known, the vulnerability's characteristics make it highly exploitable. The lack of available patches or updates increases the urgency for organizations to implement compensating controls. Given the application's role in managing medical information, the risk extends beyond technical compromise to legal and reputational damage due to potential violations of data protection regulations such as GDPR.

Potential Impact

For European organizations, particularly those in the healthcare sector, this vulnerability poses a severe risk. Exploitation could lead to unauthorized access to sensitive patient records, violating confidentiality and potentially causing harm to patients if medical data integrity is compromised. The availability impact could disrupt critical healthcare services, affecting patient care. Additionally, data breaches involving personal health information would trigger stringent regulatory consequences under GDPR, including heavy fines and mandatory breach notifications. The reputational damage to affected organizations could be significant, eroding patient trust. The vulnerability's ease of exploitation and lack of required privileges mean that attackers can operate remotely and anonymously, increasing the likelihood of attacks. Healthcare providers, clinics, and associated service providers using the Online Medicine Guide software are particularly vulnerable, potentially affecting a broad range of European countries with advanced healthcare IT infrastructures.

Mitigation Recommendations

Immediate mitigation should focus on restricting and sanitizing input to the vulnerable 'upass' parameter. Organizations should implement parameterized queries or prepared statements to prevent SQL Injection. Deploying a Web Application Firewall (WAF) with rules targeting SQL Injection patterns can provide a temporary protective layer. Monitoring database logs for unusual query patterns or failed login attempts can help detect exploitation attempts. Network segmentation should be used to limit access to the database server. Until an official patch or update is released by the software vendor, organizations should consider disabling or restricting access to the vulnerable login functionality if feasible. Conducting a thorough security audit of the application and related systems is recommended to identify other potential injection points. Finally, organizations should prepare incident response plans specific to data breaches involving medical information to comply with GDPR and other relevant regulations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f3dc6afa3b8e14e0c8d43

Added to database: 12/2/2025, 7:28:06 PM

Last enriched: 12/9/2025, 8:13:14 PM

Last updated: 1/16/2026, 11:35:17 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats