CVE-2025-8497: SQL Injection in code-projects Online Medicine Guide
A weakness has been identified in code-projects Online Medicine Guide 1.0. This affects an unknown part of the file /cusfindphar2.php. This manipulation of the argument Search causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI Analysis
Technical Summary
CVE-2025-8497 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability exists in the /cusfindphar2.php file, specifically in the handling of the 'Search' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows remote attackers to perform unauthorized database queries without authentication or user interaction, potentially leading to unauthorized data access, data modification, or database corruption. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting that while exploitation can cause harm, it may not lead to full system compromise or widespread disruption. No patches or fixes have been published yet, and no known exploits are reported in the wild, although proof-of-concept code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is an online medicine guide likely used by healthcare providers or pharmacies to access pharmaceutical information. Given the nature of the application, the database may contain sensitive medical or pharmaceutical data, making the confidentiality impact particularly relevant.
Potential Impact
For European organizations, especially those in the healthcare sector using the Online Medicine Guide 1.0, this vulnerability poses a risk of unauthorized access to sensitive pharmaceutical data. This could lead to exposure of confidential patient medication information, intellectual property related to medicines, or internal pharmacy data. Such data breaches could violate GDPR regulations, leading to legal and financial penalties. Additionally, manipulation of the database could disrupt pharmacy operations or lead to misinformation about medicines, potentially impacting patient safety. The remote and unauthenticated nature of the exploit increases the risk of attacks from external threat actors. Although the severity is medium, the healthcare context amplifies the potential reputational damage and regulatory consequences for affected organizations. The lack of patches means organizations must rely on other mitigations until a fix is available.
Mitigation Recommendations
1. Immediate implementation of Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'Search' parameter in /cusfindphar2.php. 2. Conduct thorough input validation and sanitization on all user-supplied inputs, especially the 'Search' parameter, using parameterized queries or prepared statements to prevent injection. 3. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 4. Monitor application logs for unusual query patterns or repeated failed attempts that may indicate exploitation attempts. 5. Isolate the vulnerable application from critical internal systems to contain potential breaches. 6. Engage with the vendor or development team to obtain patches or updates as soon as they become available. 7. Educate staff on the risks and signs of exploitation to enhance detection and response capabilities. 8. Consider temporary disabling or restricting access to the vulnerable functionality if feasible until a patch is released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-8497: SQL Injection in code-projects Online Medicine Guide
Description
A weakness has been identified in code-projects Online Medicine Guide 1.0. This affects an unknown part of the file /cusfindphar2.php. This manipulation of the argument Search causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-8497 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability exists in the /cusfindphar2.php file, specifically in the handling of the 'Search' parameter. An attacker can manipulate this parameter to inject malicious SQL code, which the backend database executes. This flaw allows remote attackers to perform unauthorized database queries without authentication or user interaction, potentially leading to unauthorized data access, data modification, or database corruption. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting that while exploitation can cause harm, it may not lead to full system compromise or widespread disruption. No patches or fixes have been published yet, and no known exploits are reported in the wild, although proof-of-concept code is publicly available, increasing the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is an online medicine guide likely used by healthcare providers or pharmacies to access pharmaceutical information. Given the nature of the application, the database may contain sensitive medical or pharmaceutical data, making the confidentiality impact particularly relevant.
Potential Impact
For European organizations, especially those in the healthcare sector using the Online Medicine Guide 1.0, this vulnerability poses a risk of unauthorized access to sensitive pharmaceutical data. This could lead to exposure of confidential patient medication information, intellectual property related to medicines, or internal pharmacy data. Such data breaches could violate GDPR regulations, leading to legal and financial penalties. Additionally, manipulation of the database could disrupt pharmacy operations or lead to misinformation about medicines, potentially impacting patient safety. The remote and unauthenticated nature of the exploit increases the risk of attacks from external threat actors. Although the severity is medium, the healthcare context amplifies the potential reputational damage and regulatory consequences for affected organizations. The lack of patches means organizations must rely on other mitigations until a fix is available.
Mitigation Recommendations
1. Immediate implementation of Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'Search' parameter in /cusfindphar2.php. 2. Conduct thorough input validation and sanitization on all user-supplied inputs, especially the 'Search' parameter, using parameterized queries or prepared statements to prevent injection. 3. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 4. Monitor application logs for unusual query patterns or repeated failed attempts that may indicate exploitation attempts. 5. Isolate the vulnerable application from critical internal systems to contain potential breaches. 6. Engage with the vendor or development team to obtain patches or updates as soon as they become available. 7. Educate staff on the risks and signs of exploitation to enhance detection and response capabilities. 8. Consider temporary disabling or restricting access to the vulnerable functionality if feasible until a patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-02T06:50:09.172Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 688edbdcad5a09ad00d7fe4f
Added to database: 8/3/2025, 3:47:40 AM
Last enriched: 9/5/2025, 8:14:13 PM
Last updated: 9/15/2025, 9:51:13 AM
Views: 44
Related Threats
CVE-2025-8396: CWE-770 Allocation of Resources Without Limits or Throttling in Temporal OSS Server
MediumCVE-2025-46408: n/a
HighCVE-2025-10448: SQL Injection in Campcodes Online Job Finder System
MediumCVE-2025-50944: n/a
HighCVE-2025-50110: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.