A vulnerability, which was classified as critical, has been found in PHPGurukul Hospital Management System 4.0. Affected by this issue is some unknown functionality of the file /doctor/search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/Ant1sec-ops/HMS4.0-Avdisories/blob/main/Union-based-sqli-on-doctor-search/exploit.md | Exploit Third Party Advisory |
https://phpgurukul.com/ | Product |
https://vuldb.com/?ctiid.313742 | Permissions Required VDB Entry |
https://vuldb.com/?id.313742 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.601698 | Third Party Advisory VDB Entry |
https://github.com/Ant1sec-ops/HMS4.0-Avdisories/blob/main/Union-based-sqli-on-doctor-search/exploit.md | Exploit Third Party Advisory |
Configurations
History
02 Jul 2025, 18:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 16:15
Updated : 2025-07-02 18:24
NVD link : CVE-2025-6570
Mitre link : CVE-2025-6570
CVE.ORG link : CVE-2025-6570
JSON object : View
Products Affected
anujk305
- hospital_management_system