Skip to main content

CVE-2025-7750: SQL Injection in code-projects Online Appointment Booking System

Medium
VulnerabilityCVE-2025-7750cvecve-2025-7750
Published: Thu Jul 17 2025 (07/17/2025, 19:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Appointment Booking System

Description

A vulnerability, which was classified as critical, was found in code-projects Online Appointment Booking System 1.0. Affected is an unknown function of the file /admin/adddoctorclinic.php. The manipulation of the argument clinic leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/17/2025, 19:31:52 UTC

Technical Analysis

CVE-2025-7750 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Appointment Booking System. The flaw exists in an unspecified function within the /admin/adddoctorclinic.php file, where the 'clinic' parameter is improperly sanitized or validated. This allows an unauthenticated remote attacker to inject malicious SQL code directly into the backend database queries. Exploiting this vulnerability could enable attackers to manipulate database queries, potentially leading to unauthorized data disclosure, data modification, or deletion. The vulnerability does not require any authentication or user interaction, increasing its risk. Although the CVSS 4.0 score is 6.9 (medium severity), the vector indicates network attack with low complexity and no privileges or user interaction needed, which typically elevates the risk. The vulnerability has been publicly disclosed, but no known exploits are currently reported in the wild. The lack of available patches or mitigations in the provided data suggests that affected organizations must take immediate action to prevent exploitation. The Online Appointment Booking System is likely used by healthcare providers or clinics to manage appointments, making the confidentiality and integrity of patient data a critical concern. An attacker exploiting this vulnerability could access sensitive patient information or disrupt healthcare operations.

Potential Impact

For European organizations, particularly healthcare providers using the affected Online Appointment Booking System version 1.0, this vulnerability poses a significant risk to patient data confidentiality and system integrity. Successful exploitation could lead to unauthorized access to sensitive personal health information, violating GDPR requirements and potentially resulting in severe legal and financial penalties. Additionally, manipulation or deletion of appointment or clinical data could disrupt healthcare services, impacting patient care and operational continuity. The remote, unauthenticated nature of the attack vector increases the likelihood of exploitation, especially if systems are exposed to the internet without adequate network protections. Given the criticality of healthcare data and the strict regulatory environment in Europe, this vulnerability could have far-reaching consequences for affected organizations, including reputational damage and loss of patient trust.

Mitigation Recommendations

European organizations should immediately audit their deployments of the code-projects Online Appointment Booking System to identify any instances of version 1.0. In the absence of an official patch, organizations must implement compensating controls such as: 1) Restricting access to the /admin/adddoctorclinic.php endpoint via network segmentation and firewall rules to trusted IP addresses only. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the 'clinic' parameter. 3) Conducting thorough input validation and sanitization on all user-supplied data, especially parameters used in SQL queries. 4) Monitoring logs for suspicious database query patterns or repeated failed attempts to exploit the vulnerability. 5) Planning and executing an upgrade or migration to a patched or alternative appointment booking system version as soon as it becomes available. 6) Educating IT and security teams about this vulnerability and ensuring incident response plans are updated to handle potential exploitation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-17T10:33:22.798Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68794c09a83201eaace850a2

Added to database: 7/17/2025, 7:16:25 PM

Last enriched: 7/17/2025, 7:31:52 PM

Last updated: 8/14/2025, 11:00:42 PM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats