Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70062: n/a

0
Medium
VulnerabilityCVE-2025-70062cvecve-2025-70062
Published: Wed Feb 18 2026 (02/18/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

PHPGurukul Hospital Management System v4.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the 'Add Doctor' module. The application fails to enforce CSRF token validation on the add-doctor.php endpoint. This allows remote attackers to create arbitrary Doctor accounts (privileged users) by tricking an authenticated administrator into visiting a malicious page.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:03:38 UTC

Technical Analysis

CVE-2025-70062 is a medium-severity CSRF vulnerability identified in PHPGurukul Hospital Management System version 4.0, specifically within the 'Add Doctor' functionality. The vulnerability arises because the add-doctor.php endpoint does not enforce CSRF token validation, a critical security control designed to prevent unauthorized commands from being transmitted by authenticated users. An attacker can exploit this flaw by crafting a malicious webpage that, when visited by an authenticated administrator, silently submits a request to add a new Doctor account with privileged access. This attack vector leverages the administrator's active session and privileges without requiring the attacker to authenticate or have direct access to the system. The vulnerability primarily compromises the integrity of the system by allowing unauthorized creation of privileged accounts, which could be used for further malicious activities such as data manipulation, unauthorized access to patient records, or disruption of hospital operations. The CVSS 3.1 base score of 6.5 reflects a network attack vector with low complexity, no privileges required, but requiring user interaction. The scope is unchanged, and the impact is high on integrity but none on confidentiality or availability. No public exploits have been reported, but the vulnerability remains a significant risk due to the sensitive nature of hospital management systems and the privileged access granted to Doctor accounts. The lack of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps by affected organizations.

Potential Impact

For European healthcare organizations using PHPGurukul Hospital Management System v4.0, this vulnerability poses a significant risk to the integrity of their systems. Unauthorized creation of privileged Doctor accounts can lead to unauthorized access to sensitive patient data, manipulation of medical records, and potential disruption of hospital workflows. This could undermine patient trust, violate data protection regulations such as GDPR, and result in legal and financial repercussions. The ability to escalate privileges without authentication or direct access increases the threat level, especially if attackers combine this vulnerability with social engineering tactics to lure administrators into visiting malicious sites. While confidentiality and availability are not directly impacted by this vulnerability, the creation of unauthorized privileged accounts can be a stepping stone for further attacks that may compromise these aspects. The healthcare sector is a critical infrastructure in Europe, and any compromise can have severe consequences for patient safety and public health.

Mitigation Recommendations

1. Implement robust CSRF protections by enforcing CSRF token validation on all state-changing endpoints, especially add-doctor.php. 2. Restrict access to sensitive administrative modules using strong authentication and role-based access controls. 3. Employ Content Security Policy (CSP) headers and SameSite cookies to reduce the risk of CSRF and cross-origin attacks. 4. Conduct regular security audits and code reviews to identify and remediate missing security controls. 5. Educate administrators and privileged users about phishing and social engineering risks to reduce the likelihood of visiting malicious pages. 6. Monitor logs for unusual account creation activities and implement anomaly detection to quickly identify potential exploitation attempts. 7. If possible, isolate the hospital management system from the public internet or restrict access via VPN or secure network segments. 8. Engage with the vendor or development team to obtain patches or updates addressing this vulnerability as soon as they become available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb478fb9188dea8c0311

Added to database: 2/19/2026, 12:00:07 PM

Last enriched: 2/19/2026, 12:03:38 PM

Last updated: 2/21/2026, 12:16:58 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats