CVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
A vulnerability was determined in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /browsemdcn.php. The manipulation of the argument Search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8990 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability exists in an unspecified function within the /browsemdcn.php file, specifically through the manipulation of the 'Search' argument. This flaw allows an unauthenticated remote attacker to inject malicious SQL code into the backend database queries. The injection can lead to unauthorized data access, data modification, or potentially database corruption. The vulnerability does not require any user interaction or authentication, and the attack vector is network accessible (remote). The CVSS 4.0 base score is 6.9, indicating a medium severity level, with low impact on confidentiality, integrity, and availability individually, but combined they present a moderate risk. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability is exploitable due to insufficient input validation or sanitization of the 'Search' parameter, allowing attackers to craft SQL statements that alter the intended database queries. This can lead to data leakage of sensitive medical information, unauthorized data manipulation, or disruption of service. Given the nature of the application (an online medicine guide), the exposure of sensitive health-related data could have privacy and compliance implications.
Potential Impact
For European organizations, especially healthcare providers, pharmacies, and medical information services using the affected Online Medicine Guide 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive medical information, violating GDPR and other data protection regulations. Data integrity could be compromised, potentially leading to misinformation in medical guidance, which could have downstream effects on patient care and safety. Availability impacts, while rated low, could still disrupt access to critical medical reference data. The public disclosure of the exploit increases the urgency for European organizations to address this vulnerability promptly. Additionally, healthcare is a highly targeted sector in Europe due to the sensitivity of data and critical nature of services, making this vulnerability attractive to threat actors. The medium severity rating suggests a moderate but non-negligible risk, especially given the lack of authentication and user interaction requirements for exploitation.
Mitigation Recommendations
1. Immediate application of patches or updates from the vendor is the most effective mitigation; however, no patch links are currently available, so organizations should monitor vendor communications closely. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'Search' parameter in /browsemdcn.php. 3. Conduct thorough input validation and sanitization on all user-supplied inputs, especially the 'Search' parameter, using parameterized queries or prepared statements to prevent injection. 4. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 5. Monitor application logs and database logs for suspicious query patterns or unusual access attempts. 6. If possible, isolate the affected application in a segmented network zone to reduce lateral movement risk. 7. Educate IT and security teams about this specific vulnerability and the importance of rapid response to public exploit disclosures. 8. Consider deploying runtime application self-protection (RASP) solutions that can detect and block injection attacks in real time.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
Description
A vulnerability was determined in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /browsemdcn.php. The manipulation of the argument Search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8990 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability exists in an unspecified function within the /browsemdcn.php file, specifically through the manipulation of the 'Search' argument. This flaw allows an unauthenticated remote attacker to inject malicious SQL code into the backend database queries. The injection can lead to unauthorized data access, data modification, or potentially database corruption. The vulnerability does not require any user interaction or authentication, and the attack vector is network accessible (remote). The CVSS 4.0 base score is 6.9, indicating a medium severity level, with low impact on confidentiality, integrity, and availability individually, but combined they present a moderate risk. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known exploits in the wild have been reported yet. The vulnerability is exploitable due to insufficient input validation or sanitization of the 'Search' parameter, allowing attackers to craft SQL statements that alter the intended database queries. This can lead to data leakage of sensitive medical information, unauthorized data manipulation, or disruption of service. Given the nature of the application (an online medicine guide), the exposure of sensitive health-related data could have privacy and compliance implications.
Potential Impact
For European organizations, especially healthcare providers, pharmacies, and medical information services using the affected Online Medicine Guide 1.0, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive medical information, violating GDPR and other data protection regulations. Data integrity could be compromised, potentially leading to misinformation in medical guidance, which could have downstream effects on patient care and safety. Availability impacts, while rated low, could still disrupt access to critical medical reference data. The public disclosure of the exploit increases the urgency for European organizations to address this vulnerability promptly. Additionally, healthcare is a highly targeted sector in Europe due to the sensitivity of data and critical nature of services, making this vulnerability attractive to threat actors. The medium severity rating suggests a moderate but non-negligible risk, especially given the lack of authentication and user interaction requirements for exploitation.
Mitigation Recommendations
1. Immediate application of patches or updates from the vendor is the most effective mitigation; however, no patch links are currently available, so organizations should monitor vendor communications closely. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'Search' parameter in /browsemdcn.php. 3. Conduct thorough input validation and sanitization on all user-supplied inputs, especially the 'Search' parameter, using parameterized queries or prepared statements to prevent injection. 4. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection. 5. Monitor application logs and database logs for suspicious query patterns or unusual access attempts. 6. If possible, isolate the affected application in a segmented network zone to reduce lateral movement risk. 7. Educate IT and security teams about this specific vulnerability and the importance of rapid response to public exploit disclosures. 8. Consider deploying runtime application self-protection (RASP) solutions that can detect and block injection attacks in real time.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-13T16:56:19.988Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689e83b5ad5a09ad00604d2e
Added to database: 8/15/2025, 12:47:49 AM
Last enriched: 8/22/2025, 1:06:19 AM
Last updated: 9/27/2025, 12:58:46 AM
Views: 39
Related Threats
CVE-2025-9816: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in veronalabs WP Statistics – Simple, privacy-friendly Google Analytics alternative
HighCVE-2025-11050: Improper Authorization in Portabilis i-Educar
MediumCVE-2025-10499: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-10498: CWE-352 Cross-Site Request Forgery (CSRF) in kstover Ninja Forms – The Contact Form Builder That Grows With You
MediumCVE-2025-8440: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in spwebguy Team Members
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.