Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9753: Cross Site Scripting in Campcodes Online Hospital Management System

0
Medium
VulnerabilityCVE-2025-9753cvecve-2025-9753
Published: Mon Sep 01 2025 (09/01/2025, 00:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Campcodes
Product: Online Hospital Management System

Description

A vulnerability was detected in Campcodes Online Hospital Management System 1.0. The affected element is an unknown function of the file /admin/patient-search.php of the component Patient Search Module. Performing manipulation of the argument Search by Name Mobile No results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/08/2025, 06:50:41 UTC

Technical Analysis

CVE-2025-9753 is a medium severity Cross Site Scripting (XSS) vulnerability identified in version 1.0 of the Campcodes Online Hospital Management System, specifically within the Patient Search Module located at /admin/patient-search.php. The vulnerability arises from improper sanitization or validation of user-supplied input in the 'Search by Name Mobile No' parameter. An attacker can remotely craft malicious input that, when processed by the vulnerable function, results in the execution of arbitrary scripts in the context of the victim's browser. This type of vulnerability can be exploited without authentication but requires user interaction, such as an administrator or staff member accessing the manipulated search page. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but the description suggests remote initiation, so there may be some ambiguity), user interaction required (UI:P), and limited impact primarily on integrity (VI:L) with no impact on confidentiality or availability. The exploit is publicly available, increasing the risk of exploitation, although no known active exploitation has been reported yet. Given the nature of hospital management systems, which handle sensitive patient data and critical healthcare operations, the presence of an XSS vulnerability can facilitate phishing, session hijacking, or unauthorized actions within the administrative interface, potentially leading to further compromise or data leakage.

Potential Impact

For European healthcare organizations using Campcodes Online Hospital Management System 1.0, this vulnerability poses a tangible risk to the confidentiality and integrity of patient data and administrative operations. Successful exploitation could allow attackers to execute malicious scripts in the context of hospital staff browsers, potentially leading to session hijacking, unauthorized access to sensitive patient records, or manipulation of hospital management workflows. This could undermine patient privacy, violate GDPR regulations, and disrupt hospital operations. Although the vulnerability does not directly impact availability, the indirect consequences such as loss of trust, regulatory fines, and operational disruptions could be significant. The fact that the exploit is publicly available increases the urgency for European hospitals to address this vulnerability promptly to prevent targeted attacks, especially given the critical nature of healthcare services and the high value of patient data in Europe.

Mitigation Recommendations

1. Immediate application of input validation and output encoding on the 'Search by Name Mobile No' parameter within the Patient Search Module to neutralize malicious scripts. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the hospital management system's web interface. 3. Conduct a thorough code review and penetration testing of the entire application to identify and remediate other potential XSS or injection vulnerabilities. 4. Restrict access to the /admin/patient-search.php page using strong authentication and role-based access controls to limit exposure. 5. Educate hospital staff on recognizing phishing attempts and suspicious behavior that could result from XSS exploitation. 6. Monitor web server logs and application behavior for unusual activity indicative of exploitation attempts. 7. Coordinate with Campcodes for a security patch or update; if unavailable, consider temporary mitigations such as web application firewalls (WAF) with custom rules to block malicious payloads targeting this parameter.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-31T08:22:27.487Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b4f0afad5a09ad00c625f3

Added to database: 9/1/2025, 1:02:39 AM

Last enriched: 9/8/2025, 6:50:41 AM

Last updated: 10/19/2025, 7:53:53 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats