Skip to main content

CVE-2025-8931: SQL Injection in code-projects Medical Store Management System

Medium
VulnerabilityCVE-2025-8931cvecve-2025-8931
Published: Thu Aug 14 2025 (08/14/2025, 02:32:12 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Medical Store Management System

Description

A vulnerability was determined in code-projects Medical Store Management System 1.0. Affected is an unknown function of the file ChangePassword.java. The manipulation of the argument newPassTxt leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/14/2025, 03:33:03 UTC

Technical Analysis

CVE-2025-8931 is a medium-severity SQL Injection vulnerability identified in version 1.0 of the code-projects Medical Store Management System, specifically within an unknown function in the ChangePassword.java file. The vulnerability arises from improper handling and sanitization of the 'newPassTxt' argument, which is used in a SQL query without adequate validation or parameterization. This flaw allows an attacker to inject malicious SQL code remotely, potentially manipulating the backend database. The vulnerability does not require user interaction or authentication, increasing its risk profile. The CVSS 4.0 vector indicates the attack can be launched remotely (AV:N), with low attack complexity (AC:L), no privileges required (PR:L, which implies limited privileges but still no authentication), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low individually but combined can lead to significant data manipulation or leakage. Although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the likelihood of exploitation attempts. The vulnerability affects a niche medical store management system, which likely manages sensitive patient and pharmaceutical data, making it a critical asset in healthcare environments. The lack of available patches at the time of disclosure further elevates the urgency for mitigation.

Potential Impact

For European organizations, particularly those in the healthcare and pharmaceutical sectors using the affected Medical Store Management System, this vulnerability poses a risk of unauthorized access to sensitive patient data, prescription records, and inventory information. Exploitation could lead to data breaches, unauthorized modification of medical records, or disruption of pharmaceutical supply chains. Such incidents could result in regulatory penalties under GDPR due to exposure of personal health information, reputational damage, and operational downtime. The ability to remotely exploit the vulnerability without user interaction or authentication increases the risk of automated attacks and widespread compromise. Given the critical nature of healthcare data and the reliance on accurate medical records, the integrity and availability impacts could have direct consequences on patient safety and care quality.

Mitigation Recommendations

Organizations should immediately audit their use of the code-projects Medical Store Management System version 1.0 and identify any instances of the vulnerable ChangePassword.java component. Since no official patches are currently available, mitigation should focus on implementing input validation and parameterized queries to sanitize the 'newPassTxt' input. Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting this parameter can provide interim protection. Network segmentation should be enforced to limit access to the management system from untrusted networks. Monitoring database logs and application logs for unusual query patterns or failed login attempts can help detect exploitation attempts. Additionally, organizations should plan for an upgrade or replacement of the affected system with a secure version once available and conduct regular security assessments to identify similar injection flaws. Training developers on secure coding practices, especially regarding SQL injection prevention, is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T11:26:38.492Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689d555cad5a09ad00567a64

Added to database: 8/14/2025, 3:17:48 AM

Last enriched: 8/14/2025, 3:33:03 AM

Last updated: 8/14/2025, 4:52:02 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats