Skip to main content

CVE-2025-6767: SQL Injection in sfturing hosp_order

Medium
VulnerabilityCVE-2025-6767cvecve-2025-6767
Published: Fri Jun 27 2025 (06/27/2025, 13:00:17 UTC)
Source: CVE Database V5
Vendor/Project: sfturing
Product: hosp_order

Description

A vulnerability was found in sfturing hosp_order up to 627f426331da8086ce8fff2017d65b1ddef384f8. It has been rated as critical. This issue affects the function findDoctorByCondition of the file DoctorServiceImpl.java. The manipulation of the argument hospitalName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.

AI-Powered Analysis

AILast updated: 06/27/2025, 13:29:18 UTC

Technical Analysis

CVE-2025-6767 is a SQL Injection vulnerability identified in the sfturing hosp_order software, specifically affecting the function findDoctorByCondition within the DoctorServiceImpl.java file. The vulnerability arises from improper sanitization or validation of the hospitalName argument, which an attacker can manipulate to inject malicious SQL code. This flaw allows an unauthenticated remote attacker with low privileges to execute arbitrary SQL commands against the backend database without requiring user interaction. The vulnerability is rated with a CVSS 4.0 score of 5.3 (medium severity), reflecting its moderate impact and ease of exploitation. The product uses a rolling release model, so exact version details for affected and patched releases are unavailable. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The SQL Injection could lead to unauthorized data access, data modification, or denial of service, depending on the database permissions and the injected payload. The vulnerability does not require authentication or user interaction, increasing its risk profile. However, the impact on confidentiality, integrity, and availability is rated as low to medium due to limited privileges and the scope of the injection vector. The lack of a patch link indicates that remediation may require code changes or configuration adjustments by the vendor or users.

Potential Impact

For European organizations, especially those in the healthcare sector using the sfturing hosp_order system, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive patient data, manipulation of medical orders, or disruption of hospital operations. Given the critical nature of healthcare services, any compromise could affect patient safety, regulatory compliance (e.g., GDPR), and organizational reputation. The ability to remotely exploit the vulnerability without authentication increases the attack surface, potentially allowing attackers to target multiple healthcare providers. Additionally, the rolling release model and lack of clear patch availability may delay mitigation efforts, prolonging exposure. Organizations relying on this software must consider the risk of data breaches, operational downtime, and potential legal consequences under European data protection laws.

Mitigation Recommendations

1. Immediate code review and sanitization: Developers should audit the findDoctorByCondition function to ensure proper parameterized queries or prepared statements are used to prevent SQL Injection. 2. Input validation: Implement strict validation and sanitization of the hospitalName input to reject malicious payloads. 3. Web application firewall (WAF): Deploy a WAF with SQL Injection detection rules to block suspicious requests targeting this parameter. 4. Monitoring and logging: Enhance logging around database queries involving hospitalName to detect anomalous activity. 5. Vendor engagement: Engage with sfturing to obtain patches or updates addressing this vulnerability. 6. Network segmentation: Isolate the hosp_order system within the network to limit exposure. 7. Access controls: Restrict database user privileges to the minimum necessary to reduce potential damage from injection attacks. 8. Incident response readiness: Prepare for potential exploitation by having response plans and backups in place. These steps go beyond generic advice by focusing on immediate code-level fixes, compensating controls, and organizational preparedness tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-27T06:01:58.628Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 685e9924f6cf9081996a6060

Added to database: 6/27/2025, 1:14:12 PM

Last enriched: 6/27/2025, 1:29:18 PM

Last updated: 8/21/2025, 7:57:22 AM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats