Skip to main content

CVE-2025-7754: SQL Injection in code-projects Patient Record Management System

Medium
VulnerabilityCVE-2025-7754cvecve-2025-7754
Published: Thu Jul 17 2025 (07/17/2025, 20:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Patient Record Management System

Description

A vulnerability was found in code-projects Patient Record Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /xray_form.php. The manipulation of the argument itr_no leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/17/2025, 20:31:24 UTC

Technical Analysis

CVE-2025-7754 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Patient Record Management System, specifically within the /xray_form.php file. The vulnerability arises from improper sanitization or validation of the 'itr_no' parameter, which is susceptible to malicious input manipulation. An attacker can remotely exploit this flaw by injecting crafted SQL commands through the 'itr_no' argument, potentially allowing unauthorized access to the underlying database. This could lead to unauthorized data retrieval, modification, or deletion of patient records stored within the system. The vulnerability does not require user interaction and can be exploited over the network without authentication, increasing the risk of automated or widespread attacks. Although the CVSS 4.0 base score is 5.3 (medium severity), the impact on confidentiality, integrity, and availability is notable due to the sensitive nature of patient data managed by the system. No official patches or fixes have been published yet, and while no known exploits are currently observed in the wild, the public disclosure of the exploit details raises the risk of imminent exploitation attempts. The vulnerability affects only version 1.0 of the product, which suggests that organizations using this specific version are at risk. Given the criticality of healthcare data, the presence of this vulnerability in a patient record management system is a significant concern.

Potential Impact

For European organizations, the exploitation of this SQL Injection vulnerability could have severe consequences. Patient record management systems contain highly sensitive personal health information protected under GDPR and other privacy regulations. Unauthorized access or data breaches could lead to significant legal penalties, reputational damage, and loss of patient trust. Additionally, manipulation or deletion of medical records could disrupt healthcare delivery, potentially endangering patient safety. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, including automated scanning and exploitation by cybercriminals or state-sponsored actors. Healthcare providers, clinics, and hospitals using this vulnerable system may face operational disruptions and costly incident response efforts. Furthermore, the exposure of health data could facilitate further targeted attacks such as identity theft or insurance fraud. The medium CVSS score reflects some limitations in exploit impact or complexity, but the criticality of the data involved amplifies the real-world risk for European healthcare entities.

Mitigation Recommendations

Immediate mitigation steps include: 1) Conducting an urgent inventory to identify any deployments of code-projects Patient Record Management System version 1.0 within the organization. 2) Restricting network access to the affected application, especially the /xray_form.php endpoint, using firewalls or web application firewalls (WAFs) to block malicious payloads targeting the 'itr_no' parameter. 3) Implementing input validation and parameterized queries or prepared statements in the application code to prevent SQL Injection if source code access and modification are possible. 4) Monitoring logs for unusual database queries or repeated access attempts to the vulnerable endpoint. 5) Engaging with the vendor or community to obtain patches or updates; if unavailable, consider upgrading to a newer, unaffected version or migrating to alternative systems. 6) Applying strict access controls and network segmentation to limit exposure of the patient record system. 7) Educating IT and security teams about the vulnerability and potential indicators of compromise. These measures should be prioritized given the sensitive nature of the data and the public disclosure of the exploit.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-17T10:35:01.776Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68795a0ca83201eaace8b8a0

Added to database: 7/17/2025, 8:16:12 PM

Last enriched: 7/17/2025, 8:31:24 PM

Last updated: 7/17/2025, 9:31:13 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats