CVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
A flaw has been found in code-projects Online Medicine Guide 1.0. This vulnerability affects unknown code of the file /adphar.php. Executing manipulation of the argument phuname can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-9028 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability resides in the /adphar.php file, specifically in the handling of the 'phuname' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially compromising the backend database. The vulnerability requires no authentication or user interaction, making it accessible to unauthenticated remote attackers. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector details (AV:N/AC:L/AT:N/PR:N/UI:N) confirm that the attack can be performed over the network with low attack complexity, no privileges, and no user interaction. The impact on confidentiality, integrity, and availability is low to limited, suggesting that while some data exposure or modification is possible, the scope of damage is somewhat constrained. No official patches or mitigations have been published yet, and although an exploit has been made public, there are no confirmed reports of exploitation in the wild at this time. The vulnerability affects only version 1.0 of the product, which is an online medicine guide likely used in healthcare settings to provide pharmaceutical information. Given the nature of the application, the backend database may contain sensitive medical or user data, increasing the risk profile if exploited. The lack of authentication requirement and remote exploitability make this a significant concern for organizations using this software.
Potential Impact
For European organizations, especially those in the healthcare sector using the code-projects Online Medicine Guide 1.0, this vulnerability poses a risk of unauthorized access to sensitive medical data or alteration of information. Compromise of the database could lead to leakage of patient or pharmaceutical information, undermining patient privacy and potentially violating GDPR regulations. Although the CVSS score suggests a medium severity, the healthcare context elevates the impact due to the sensitivity of data involved. Additionally, manipulation of medical information could affect clinical decisions or patient safety. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly if the software is exposed to the internet without adequate network protections. The absence of patches means organizations must rely on other mitigations to reduce risk. The reputational damage and regulatory penalties from a data breach in healthcare can be severe, making this vulnerability a critical concern for affected entities in Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the Online Medicine Guide application to trusted internal networks or via VPN to reduce exposure to external attackers. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'phuname' parameter. 3) Conducting thorough input validation and sanitization on the 'phuname' parameter if source code access is available, applying parameterized queries or prepared statements to prevent injection. 4) Monitoring application logs and network traffic for suspicious activity related to /adphar.php and the 'phuname' parameter. 5) Planning and prioritizing an upgrade or replacement of the vulnerable software version once patches or newer secure versions become available. 6) Educating IT and security teams about the vulnerability and ensuring incident response plans include scenarios involving SQL injection attacks. These targeted measures go beyond generic advice by focusing on the specific vulnerable parameter and application context.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
Description
A flaw has been found in code-projects Online Medicine Guide 1.0. This vulnerability affects unknown code of the file /adphar.php. Executing manipulation of the argument phuname can lead to sql injection. The attack can be launched remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-9028 is a SQL Injection vulnerability identified in version 1.0 of the code-projects Online Medicine Guide application. The vulnerability resides in the /adphar.php file, specifically in the handling of the 'phuname' parameter. An attacker can remotely manipulate this parameter to inject malicious SQL code, potentially compromising the backend database. The vulnerability requires no authentication or user interaction, making it accessible to unauthenticated remote attackers. The CVSS 4.0 base score is 6.9, indicating a medium severity level. The vector details (AV:N/AC:L/AT:N/PR:N/UI:N) confirm that the attack can be performed over the network with low attack complexity, no privileges, and no user interaction. The impact on confidentiality, integrity, and availability is low to limited, suggesting that while some data exposure or modification is possible, the scope of damage is somewhat constrained. No official patches or mitigations have been published yet, and although an exploit has been made public, there are no confirmed reports of exploitation in the wild at this time. The vulnerability affects only version 1.0 of the product, which is an online medicine guide likely used in healthcare settings to provide pharmaceutical information. Given the nature of the application, the backend database may contain sensitive medical or user data, increasing the risk profile if exploited. The lack of authentication requirement and remote exploitability make this a significant concern for organizations using this software.
Potential Impact
For European organizations, especially those in the healthcare sector using the code-projects Online Medicine Guide 1.0, this vulnerability poses a risk of unauthorized access to sensitive medical data or alteration of information. Compromise of the database could lead to leakage of patient or pharmaceutical information, undermining patient privacy and potentially violating GDPR regulations. Although the CVSS score suggests a medium severity, the healthcare context elevates the impact due to the sensitivity of data involved. Additionally, manipulation of medical information could affect clinical decisions or patient safety. The remote and unauthenticated nature of the exploit increases the likelihood of attacks, particularly if the software is exposed to the internet without adequate network protections. The absence of patches means organizations must rely on other mitigations to reduce risk. The reputational damage and regulatory penalties from a data breach in healthcare can be severe, making this vulnerability a critical concern for affected entities in Europe.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Restricting access to the Online Medicine Guide application to trusted internal networks or via VPN to reduce exposure to external attackers. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the 'phuname' parameter. 3) Conducting thorough input validation and sanitization on the 'phuname' parameter if source code access is available, applying parameterized queries or prepared statements to prevent injection. 4) Monitoring application logs and network traffic for suspicious activity related to /adphar.php and the 'phuname' parameter. 5) Planning and prioritizing an upgrade or replacement of the vulnerable software version once patches or newer secure versions become available. 6) Educating IT and security teams about the vulnerability and ensuring incident response plans include scenarios involving SQL injection attacks. These targeted measures go beyond generic advice by focusing on the specific vulnerable parameter and application context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-14T07:18:51.453Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689f1055ad5a09ad006b3943
Added to database: 8/15/2025, 10:47:49 AM
Last enriched: 8/28/2025, 1:08:03 AM
Last updated: 11/14/2025, 6:02:15 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64444: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Sony Network Communications Inc. NCP-HG100/Cellular model
HighCVE-2025-13161: CWE-23 Relative Path Traversal in IQ Service International IQ-Support
HighCVE-2025-13160: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IQ Service International IQ-Support
MediumCVE-2025-9479: Out of bounds read in Google Chrome
UnknownCVE-2025-13107: Inappropriate implementation in Google Chrome
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.