Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65358: n/a

0
Critical
VulnerabilityCVE-2025-65358cvecve-2025-65358
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Edoc-doctor-appointment-system v1.0.1 was discovered to contain SQl injection vulnerability via the 'docid' parameter at /admin/appointment.php.

AI-Powered Analysis

AILast updated: 12/09/2025, 17:54:29 UTC

Technical Analysis

CVE-2025-65358 is a critical SQL injection vulnerability identified in version 1.0.1 of the Edoc-doctor-appointment-system, a software platform used for managing doctor appointments. The vulnerability exists in the 'docid' parameter of the /admin/appointment.php endpoint, which fails to properly sanitize user input before incorporating it into SQL queries. This flaw allows an unauthenticated attacker to inject malicious SQL code remotely, potentially leading to unauthorized data access, data modification, or deletion. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection issue. The CVSS v3.1 base score is 9.8, reflecting the high impact on confidentiality, integrity, and availability, combined with low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime candidate for exploitation. The lack of available patches increases the urgency for organizations to implement immediate mitigations. The affected system is likely deployed in healthcare environments, where patient data confidentiality and system availability are critical. Exploitation could lead to data breaches involving sensitive personal health information, disruption of appointment scheduling services, and potential regulatory non-compliance under GDPR and other data protection laws.

Potential Impact

For European organizations, particularly healthcare providers using Edoc-doctor-appointment-system, this vulnerability poses a severe risk. Exploitation could result in unauthorized disclosure of sensitive patient data, violating GDPR and other privacy regulations, leading to significant legal and financial penalties. Integrity of appointment data could be compromised, causing incorrect scheduling or denial of service to patients. Availability of the appointment system could be disrupted, impacting healthcare delivery and patient trust. The critical nature of the vulnerability means attackers can exploit it remotely without authentication, increasing the likelihood of attacks. Given the sensitive nature of healthcare data and the critical role of appointment systems, the impact extends beyond IT to patient safety and organizational reputation. European healthcare institutions are often targeted by cybercriminals and state-sponsored actors, making this vulnerability a high-value target. The absence of known exploits currently provides a window for proactive defense, but the risk of rapid weaponization is high.

Mitigation Recommendations

Immediate mitigation steps include implementing strict input validation and sanitization on the 'docid' parameter to prevent malicious SQL code injection. Employ parameterized queries or prepared statements in the application code to eliminate direct concatenation of user inputs into SQL commands. Restrict access to the /admin/appointment.php endpoint using network-level controls such as IP whitelisting or VPN access to limit exposure. Monitor logs for unusual database query patterns or repeated failed attempts targeting the 'docid' parameter. Deploy web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting this endpoint. Conduct a thorough code review of the application to identify and remediate other potential injection points. Engage with the software vendor or development team to obtain or develop a security patch. In the absence of an official patch, consider isolating the affected system or disabling the vulnerable functionality temporarily. Regularly back up appointment data securely to enable recovery in case of data corruption or deletion. Educate IT and security teams about this vulnerability to ensure rapid detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692f15bf17aa519cfe1691ed

Added to database: 12/2/2025, 4:37:19 PM

Last enriched: 12/9/2025, 5:54:29 PM

Last updated: 1/16/2026, 10:09:06 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats