Skip to main content

CVE-2025-8809: SQL Injection in code-projects Online Medicine Guide

Medium
VulnerabilityCVE-2025-8809cvecve-2025-8809
Published: Sun Aug 10 2025 (08/10/2025, 12:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Medicine Guide

Description

A vulnerability classified as critical has been found in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /addelidetails.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/18/2025, 01:00:05 UTC

Technical Analysis

CVE-2025-8809 is a critical SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability resides in an unspecified function within the /addelidetails.php file, where the 'del' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection flaw enables remote exploitation without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the underlying database, potentially allowing attackers to read, modify, or delete sensitive medical data stored within the application. Although the CVSS score is 6.9 (medium severity), the exploitability is high due to the lack of required privileges and user interaction. The vulnerability has been publicly disclosed, but no known exploits have been observed in the wild yet. The absence of a patch link suggests that a fix may not be available at this time, increasing the urgency for mitigation. Given the nature of the application—an online medicine guide—compromise could lead to exposure of sensitive healthcare information or disruption of medical reference data, which could have downstream effects on patient care and trust in healthcare IT systems.

Potential Impact

For European organizations, especially healthcare providers, clinics, and medical research institutions using the Online Medicine Guide, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to confidential medical information, violating GDPR and other data protection regulations, potentially resulting in heavy fines and reputational damage. The integrity of medical data could be compromised, leading to incorrect medical guidance or treatment decisions. Availability impacts could disrupt access to critical medical reference information, affecting healthcare delivery. Given the criticality of healthcare data and the strict regulatory environment in Europe, even a medium-severity vulnerability with remote exploitability is a serious concern. Furthermore, the healthcare sector is a frequent target of cyberattacks in Europe, increasing the likelihood that threat actors might attempt to exploit this vulnerability once weaponized.

Mitigation Recommendations

Immediate mitigation should include implementing input validation and parameterized queries or prepared statements to prevent SQL injection in the /addelidetails.php file, specifically sanitizing the 'del' parameter. Organizations should monitor web application logs for unusual or suspicious SQL queries targeting this endpoint. If a patch is not yet available from the vendor, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts against the vulnerable parameter. Conduct a thorough audit of all user inputs in the application to identify and remediate similar injection points. Additionally, restrict database user permissions to the minimum necessary to limit the impact of a successful injection. Regular backups of the database should be maintained to enable recovery in case of data tampering or deletion. Finally, organizations should stay alert for vendor updates or patches and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-09T07:56:41.187Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689894eead5a09ad001862d0

Added to database: 8/10/2025, 12:47:42 PM

Last enriched: 8/18/2025, 1:00:05 AM

Last updated: 9/17/2025, 7:15:09 PM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats