Skip to main content

CVE-2025-8990: SQL Injection in code-projects Online Medicine Guide

Medium
VulnerabilityCVE-2025-8990cvecve-2025-8990
Published: Fri Aug 15 2025 (08/15/2025, 00:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Medicine Guide

Description

A vulnerability was determined in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /browsemdcn.php. The manipulation of the argument Search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:06:19 UTC

Technical Analysis

CVE-2025-8990 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability exists in an unspecified function within the /browsemdcn.php file, specifically through the manipulation of the 'Search' argument. This flaw allows an unauthenticated remote attacker to inject malicious SQL code into the backend database queries. The injection can lead to unauthorized data access, data modification, or potentially database corruption. The vulnerability does not require any user interaction or authentication, and the attack vector is network accessible (remote). The CVSS 4.0 base score is 6.9, indicating a medium severity level, with low impact on confidentiality, integrity, and availability individually, but combined they present a moderate risk. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability is exploitable due to insufficient input validation or sanitization of the 'Search' parameter, allowing attackers to craft SQL statements that alter the intended database queries. This can lead to data leakage of sensitive medical information, unauthorized data manipulation, or disruption of service. Given the nature of the application (an online medicine guide), the exposure of sensitive health-related data could have privacy and compliance implications.

Potential Impact

For European organizations, especially healthcare providers, pharmacies, and medical information services using the affected Online Medicine Guide 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive medical information, violating GDPR and other data protection regulations. Data integrity could be compromised, potentially leading to misinformation in medical guidance, which could have downstream effects on patient care and safety. Availability impacts, while rated low, could still disrupt access to critical medical reference data. The public disclosure of the exploit increases the urgency for European organizations to address this vulnerability promptly. Additionally, healthcare is a highly targeted sector in Europe due to the sensitivity of data and critical nature of services, making this vulnerability attractive to threat actors. The medium severity rating suggests a moderate but non-negligible risk, especially given the lack of authentication and user interaction requirements for exploitation.

Mitigation Recommendations

1. Immediate application of patches or updates from the vendor is the most effective mitigation; however, no patch links are currently available, so organizations should monitor vendor communications closely. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'Search' parameter in /browsemdcn.php. 3. Conduct thorough input validation and sanitization on all user-supplied inputs, especially the 'Search' parameter, using parameterized queries or prepared statements to prevent injection. 4. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 5. Monitor application logs and database logs for suspicious query patterns or unusual access attempts. 6. If possible, isolate the affected application in a segmented network zone to reduce lateral movement risk. 7. Educate IT and security teams about this specific vulnerability and the importance of rapid response to public exploit disclosures. 8. Consider deploying runtime application self-protection (RASP) solutions that can detect and block injection attacks in real time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T16:56:19.988Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689e83b5ad5a09ad00604d2e

Added to database: 8/15/2025, 12:47:49 AM

Last enriched: 8/22/2025, 1:06:19 AM

Last updated: 9/27/2025, 12:58:46 AM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats