A vulnerability classified as critical was found in code-projects Patient Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /sputum_form.php. The manipulation of the argument itr_no leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://code-projects.org/ | Product |
https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_3.pdf | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.311113 | Permissions Required |
https://vuldb.com/?id.311113 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.589364 | Third Party Advisory VDB Entry |
https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_3.pdf | Exploit Third Party Advisory |
Configurations
History
06 Jun 2025, 15:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://code-projects.org/ - Product | |
References | () https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_3.pdf - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.311113 - Permissions Required | |
References | () https://vuldb.com/?id.311113 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.589364 - Third Party Advisory, VDB Entry | |
First Time |
Code-projects
Code-projects patient Record Management System |
|
CPE | cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:* |
05 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/bazhahei123/CVE/blob/main/sql_cve_6_3.pdf - |
05 Jun 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-05 01:15
Updated : 2025-06-06 15:17
NVD link : CVE-2025-5627
Mitre link : CVE-2025-5627
CVE.ORG link : CVE-2025-5627
JSON object : View
Products Affected
code-projects
- patient_record_management_system