Skip to main content

CVE-2025-9028: SQL Injection in code-projects Online Medicine Guide

Medium
VulnerabilityCVE-2025-9028cvecve-2025-9028
Published: Fri Aug 15 2025 (08/15/2025, 10:32:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Medicine Guide

Description

A vulnerability was found in code-projects Online Medicine Guide 1.0. This issue affects some unknown processing of the file /adphar.php. The manipulation of the argument phuname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/15/2025, 11:02:51 UTC

Technical Analysis

CVE-2025-9028 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability arises from improper sanitization of the 'phuname' parameter in the /adphar.php endpoint, allowing an attacker to inject malicious SQL code. This flaw enables remote attackers to manipulate backend database queries without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector metrics specify that the attack can be performed remotely (AV:N) with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L, VI:L, VA:L), suggesting partial data disclosure or modification but not full system compromise. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The absence of patches or vendor advisories at this time means affected organizations must rely on mitigation strategies until an official fix is released. The vulnerability specifically targets the Online Medicine Guide product, which is likely used by healthcare providers or related organizations to manage medical information, making the confidentiality and integrity of patient data a critical concern.

Potential Impact

For European organizations, particularly those in the healthcare sector using the Online Medicine Guide 1.0, this vulnerability poses a significant risk to patient data confidentiality and integrity. Exploitation could lead to unauthorized access to sensitive medical records, manipulation of medical information, or disruption of service availability. Such breaches could violate GDPR requirements, leading to legal penalties and reputational damage. The healthcare sector is a high-value target for cybercriminals due to the sensitivity of data and potential for ransom attacks. Even though the CVSS score indicates medium severity, the critical nature of healthcare data elevates the impact. Additionally, the ability to exploit this vulnerability remotely without authentication increases the attack surface. European healthcare providers relying on this software must consider the risk of data breaches, potential operational disruptions, and compliance violations.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the /adphar.php endpoint through network-level controls such as firewalls or web application firewalls (WAFs) configured to detect and block SQL injection patterns targeting the 'phuname' parameter. 2) Employing input validation and sanitization at the application or proxy level to neutralize malicious SQL inputs. 3) Conducting thorough code reviews and applying manual or automated fixes to sanitize the 'phuname' parameter if source code access is available. 4) Monitoring logs for unusual query patterns or repeated access attempts to /adphar.php indicative of exploitation attempts. 5) Segregating the database with least privilege principles to limit the impact of any successful injection. 6) Preparing incident response plans specific to data breaches involving medical information. Organizations should also engage with the vendor for updates and patches and plan timely application of fixes once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-14T07:18:51.453Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 689f1055ad5a09ad006b3943

Added to database: 8/15/2025, 10:47:49 AM

Last enriched: 8/15/2025, 11:02:51 AM

Last updated: 8/15/2025, 2:17:50 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats