Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70063: n/a

0
Medium
VulnerabilityCVE-2025-70063cvecve-2025-70063
Published: Wed Feb 18 2026 (02/18/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

The 'Medical History' module in PHPGurukul Hospital Management System v4.0 contains an Insecure Direct Object Reference (IDOR) vulnerability. The application fails to verify that the requested 'viewid' parameter belongs to the currently authenticated patient. This allows a user to access the confidential medical records of other patients by iterating the 'viewid' integer.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:03:53 UTC

Technical Analysis

The vulnerability CVE-2025-70063 is an Insecure Direct Object Reference (IDOR) flaw in the 'Medical History' module of PHPGurukul Hospital Management System version 4.0. This vulnerability arises because the application does not verify that the 'viewid' parameter, which identifies a patient's medical record, belongs to the currently authenticated user. As a result, an authenticated patient can manipulate the 'viewid' parameter by iterating through integer values to access other patients' confidential medical records without authorization. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key). The CVSS v3.1 score is 6.5 (medium severity) with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating that the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and results in a high confidentiality impact without affecting integrity or availability. No patches or known exploits are currently available. The vulnerability poses a significant privacy risk, exposing sensitive patient data and violating data protection regulations such as GDPR. The lack of proper access control checks is a critical design flaw that must be addressed to prevent unauthorized data disclosure.

Potential Impact

For European organizations, this vulnerability poses a serious risk to patient privacy and data protection compliance. Unauthorized access to medical records can lead to breaches of GDPR, resulting in substantial fines and reputational damage. Healthcare providers may face legal liabilities and loss of patient trust. The exposure of sensitive health information can also lead to secondary harms such as discrimination or identity theft. Since the vulnerability requires only authenticated access, insider threats or compromised patient accounts could be leveraged to exploit this flaw. The medium CVSS score reflects the moderate ease of exploitation combined with the high confidentiality impact. The lack of impact on integrity and availability means the system's operation remains intact, but the confidentiality breach alone is critical in healthcare contexts. European healthcare systems are increasingly targeted by cyber adversaries, making timely mitigation essential to protect sensitive data.

Mitigation Recommendations

1. Implement strict server-side authorization checks to ensure that the 'viewid' parameter corresponds only to the authenticated patient's records. 2. Employ role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms to enforce fine-grained access policies. 3. Conduct thorough code reviews and security testing focusing on access control vulnerabilities, especially IDOR issues. 4. Monitor and audit access logs for unusual patterns, such as sequential 'viewid' access attempts, which may indicate exploitation attempts. 5. Educate developers on secure coding practices to prevent similar authorization bypass vulnerabilities. 6. If possible, apply input validation and parameterization to restrict 'viewid' values to authorized ranges. 7. Engage with the vendor or development team to obtain or develop patches addressing this vulnerability. 8. Consider implementing multi-factor authentication (MFA) to reduce the risk of compromised accounts being used to exploit this flaw. 9. Inform patients about best practices for account security to mitigate risks from compromised credentials.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6996fb478fb9188dea8c0315

Added to database: 2/19/2026, 12:00:07 PM

Last enriched: 2/19/2026, 12:03:53 PM

Last updated: 2/21/2026, 12:13:44 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats