Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5179: SQL Injection in SourceCodester Simple Doctors Appointment System

0
Medium
VulnerabilityCVE-2026-5179cvecve-2026-5179
Published: Tue Mar 31 2026 (03/31/2026, 04:00:18 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Simple Doctors Appointment System

Description

CVE-2026-5179 is a medium severity SQL injection vulnerability found in SourceCodester Simple Doctors Appointment System version 1. 0, specifically in the /admin/login. php file. The flaw allows remote attackers to manipulate the Username parameter to execute arbitrary SQL commands without authentication or user interaction. This vulnerability can lead to unauthorized data access or modification, potentially compromising the confidentiality and integrity of sensitive patient and administrative data. Although no known exploits are currently active in the wild, the exploit code is publicly available, increasing the risk of exploitation. The vulnerability has a CVSS 4. 0 base score of 6. 9, reflecting its ease of exploitation and impact on data confidentiality and integrity. Organizations using this system should prioritize patching or applying mitigations to prevent remote attackers from leveraging this flaw.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 04:53:49 UTC

Technical Analysis

CVE-2026-5179 identifies a SQL injection vulnerability in the SourceCodester Simple Doctors Appointment System version 1.0, specifically within the /admin/login.php script. The vulnerability arises from improper sanitization of the Username parameter, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This injection flaw can be exploited to manipulate backend database queries, potentially enabling unauthorized access to sensitive patient records, administrative credentials, or other confidential data stored within the system's database. The vulnerability has a CVSS 4.0 score of 6.9, indicating a medium severity level due to its network attack vector, low attack complexity, and no privileges or user interaction required. While no active exploits have been reported in the wild, the public availability of exploit code increases the likelihood of future attacks. The affected product is primarily used in healthcare appointment scheduling, making the confidentiality and integrity of patient data critical. The lack of patches or official fixes at the time of reporting necessitates immediate mitigation efforts by administrators. The vulnerability does not affect system availability directly but poses significant risks to data confidentiality and integrity. The attack surface is limited to the admin login page, but given the critical nature of the data involved, exploitation could have serious consequences.

Potential Impact

The primary impact of CVE-2026-5179 is the potential unauthorized disclosure and modification of sensitive healthcare data, including patient information and administrative credentials. Successful exploitation could allow attackers to bypass authentication mechanisms, access or alter appointment records, and potentially escalate privileges within the system. This compromises data confidentiality and integrity, undermining trust in the healthcare provider's IT infrastructure. Although availability is not directly affected, the breach of sensitive data can lead to regulatory penalties, reputational damage, and operational disruptions. Organizations worldwide using this appointment system, especially those handling large volumes of patient data, face increased risk of data breaches and compliance violations. The remote and unauthenticated nature of the exploit increases the attack surface, making it easier for threat actors to target vulnerable systems. The public release of exploit code further elevates the threat level by enabling less skilled attackers to conduct attacks. Healthcare providers and associated entities could face legal liabilities and loss of patient trust if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2026-5179, organizations should immediately implement input validation and sanitization on the Username parameter within /admin/login.php to prevent SQL injection. Employing parameterized queries or prepared statements is critical to eliminate direct injection risks. Restricting access to the admin login page via IP whitelisting or VPN-only access can reduce exposure. Monitoring and logging login attempts for suspicious activity will help detect exploitation attempts early. If possible, upgrade to a patched version of the software once available or apply vendor-provided fixes. In the absence of official patches, consider deploying web application firewalls (WAFs) with custom rules to block SQL injection payloads targeting the Username parameter. Conduct thorough code reviews and penetration testing focused on injection vulnerabilities in all user input fields. Regularly back up databases and ensure secure storage to enable recovery in case of compromise. Educate administrators about the risks and signs of exploitation to improve incident response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-30T18:58:56.794Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cb4fb9e6bfc5ba1dc69fd5

Added to database: 3/31/2026, 4:38:17 AM

Last enriched: 3/31/2026, 4:53:49 AM

Last updated: 3/31/2026, 5:50:11 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses