CVE-2025-8809: SQL Injection in code-projects Online Medicine Guide
A vulnerability classified as critical has been found in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /addelidetails.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8809 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability resides in an unspecified function within the /addelidetails.php file, where the 'del' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, potentially allowing attackers to read, modify, or delete sensitive medical data stored within the application. Although the CVSS score is 6.9 (medium severity), the exploitability is high due to the lack of required privileges and user interaction. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild yet. The absence of a patch link suggests that a fix may not be available at this time, increasing the urgency for mitigation. Given the nature of the application—an online medicine guide—compromise could lead to exposure of sensitive healthcare information or disruption of medical reference data, which could have downstream effects on patient care and trust in healthcare IT systems.
Potential Impact
For European organizations, especially healthcare providers, clinics, and medical research institutions using the Online Medicine Guide, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to confidential medical information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. The integrity of medical data could be compromised, leading to incorrect medical guidance or treatment decisions. Availability impacts could disrupt access to critical medical reference information, affecting healthcare delivery. Given the criticality of healthcare data and the strict regulatory environment in Europe, even a medium-severity vulnerability with remote exploitability is a serious concern. Furthermore, the healthcare sector is a frequent target of cyberattacks in Europe, increasing the likelihood that threat actors might attempt to exploit this vulnerability once weaponized.
Mitigation Recommendations
Immediate mitigation should include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the /addelidetails.php file, specifically sanitizing the 'del' parameter. Organizations should monitor web application logs for unusual or suspicious SQL queries targeting this endpoint. If a patch is not yet available from the vendor, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts against the vulnerable parameter. Conduct a thorough audit of all user inputs in the application to identify and remediate similar injection points. Additionally, restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Regular backups of the database should be maintained to enable recovery in case of data tampering or deletion. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-8809: SQL Injection in code-projects Online Medicine Guide
Description
A vulnerability classified as critical has been found in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /addelidetails.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8809 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability resides in an unspecified function within the /addelidetails.php file, where the 'del' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, potentially allowing attackers to read, modify, or delete sensitive medical data stored within the application. Although the CVSS score is 6.9 (medium severity), the exploitability is high due to the lack of required privileges and user interaction. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild yet. The absence of a patch link suggests that a fix may not be available at this time, increasing the urgency for mitigation. Given the nature of the application—an online medicine guide—compromise could lead to exposure of sensitive healthcare information or disruption of medical reference data, which could have downstream effects on patient care and trust in healthcare IT systems.
Potential Impact
For European organizations, especially healthcare providers, clinics, and medical research institutions using the Online Medicine Guide, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to confidential medical information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. The integrity of medical data could be compromised, leading to incorrect medical guidance or treatment decisions. Availability impacts could disrupt access to critical medical reference information, affecting healthcare delivery. Given the criticality of healthcare data and the strict regulatory environment in Europe, even a medium-severity vulnerability with remote exploitability is a serious concern. Furthermore, the healthcare sector is a frequent target of cyberattacks in Europe, increasing the likelihood that threat actors might attempt to exploit this vulnerability once weaponized.
Mitigation Recommendations
Immediate mitigation should include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the /addelidetails.php file, specifically sanitizing the 'del' parameter. Organizations should monitor web application logs for unusual or suspicious SQL queries targeting this endpoint. If a patch is not yet available from the vendor, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts against the vulnerable parameter. Conduct a thorough audit of all user inputs in the application to identify and remediate similar injection points. Additionally, restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Regular backups of the database should be maintained to enable recovery in case of data tampering or deletion. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-09T07:56:41.187Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689894eead5a09ad001862d0
Added to database: 8/10/2025, 12:47:42 PM
Last enriched: 8/18/2025, 1:00:05 AM
Last updated: 9/17/2025, 7:15:09 PM
Views: 33
Related Threats
CVE-2025-10769: Deserialization in h2oai h2o-3
MediumCVE-2025-10768: Deserialization in h2oai h2o-3
MediumCVE-2025-10766: Path Traversal in SeriaWei ZKEACMS
MediumCVE-2025-10761: Improper Restriction of Excessive Authentication Attempts in Harness
MediumCVE-2025-10760: Server-Side Request Forgery in Harness
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.