Skip to main content

CVE-2025-8990: SQL Injection in code-projects Online Medicine Guide

Medium
VulnerabilityCVE-2025-8990cvecve-2025-8990
Published: Fri Aug 15 2025 (08/15/2025, 00:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Medicine Guide

Description

A vulnerability was determined in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /browsemdcn.php. The manipulation of the argument Search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/15/2025, 01:02:55 UTC

Technical Analysis

CVE-2025-8990 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability resides in an unspecified function within the /browsemdcn.php file, specifically through the manipulation of the 'Search' parameter. An attacker can remotely exploit this flaw without requiring authentication or user interaction, by injecting malicious SQL code into the 'Search' argument. This injection can lead to unauthorized access to the backend database, potentially allowing attackers to read, modify, or delete sensitive medical data stored within the application. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector metrics highlight that the attack is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and has low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). No patches or fixes have been published yet, and while the exploit has been publicly disclosed, there are no confirmed reports of active exploitation in the wild. The vulnerability's presence in a healthcare-related application raises concerns due to the sensitivity of medical data and the critical nature of healthcare services.

Potential Impact

For European organizations, especially those involved in healthcare services, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of patient records, violating data protection regulations such as the GDPR, which mandates strict controls over personal health information. The integrity of medical data could be compromised, potentially affecting clinical decisions and patient safety. Additionally, disruption or manipulation of the Online Medicine Guide could impair healthcare providers' ability to access accurate medication information, leading to treatment errors. The reputational damage and potential regulatory penalties resulting from a breach could be substantial. Given the remote and unauthenticated nature of the attack, any exposed instance of the vulnerable software is at risk, increasing the threat surface for European healthcare providers and associated organizations.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the vulnerable /browsemdcn.php endpoint, such as implementing web application firewalls (WAFs) with rules designed to detect and block SQL injection patterns targeting the 'Search' parameter. Input validation and parameterized queries should be enforced in the application code to sanitize user inputs and prevent injection. Organizations should conduct thorough code reviews and security testing of the Online Medicine Guide application to identify and remediate similar vulnerabilities. Until an official patch is released, deploying network segmentation to isolate the application and limiting exposure to trusted networks can reduce risk. Monitoring logs for unusual database queries or access patterns related to the 'Search' parameter can help detect exploitation attempts. Additionally, organizations should prepare incident response plans specific to potential data breaches involving medical information.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-13T16:56:19.988Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689e83b5ad5a09ad00604d2e

Added to database: 8/15/2025, 12:47:49 AM

Last enriched: 8/15/2025, 1:02:55 AM

Last updated: 8/15/2025, 1:32:49 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats