C4G Basic Laboratory Information System 3.4 contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL commands by injecting malicious code through the site parameter. Attackers can send GET requests to the users_select.php endpoint with crafted SQL payloads to extract sensitive database information including patient records and system credentials.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/46438 | Exploit VDB Entry |
| https://www.vulncheck.com/advisories/c4g-blis-sql-injection-via-users-select-php | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Apr 2026, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gatech:computing_for_good\'s_basic_laboratory_information_system:*:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/46438 - Exploit, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/c4g-blis-sql-injection-via-users-select-php - Third Party Advisory | |
| First Time |
Gatech computing For Good\'s Basic Laboratory Information System
Gatech |
|
| CWE | CWE-89 |
05 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-05 21:16
Updated : 2026-04-20 17:50
NVD link : CVE-2019-25678
Mitre link : CVE-2019-25678
CVE.ORG link : CVE-2019-25678
JSON object : View
Products Affected
gatech
- computing_for_good\'s_basic_laboratory_information_system
