CVE-2025-7604

| EUVD-2025-21349 HIGH
2025-07-14 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:43 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:43 euvd
EUVD-2025-21349
PoC Detected
Jul 16, 2025 - 14:32 vuln.today
Public exploit code
CVE Published
Jul 14, 2025 - 13:15 nvd
HIGH 7.3

Description

A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user-login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

PHPGurukul Hospital Management System 4.0 contains a critical SQL injection vulnerability in the /user-login.php file's Username parameter that allows unauthenticated remote attackers to execute arbitrary SQL queries. The vulnerability has been publicly disclosed with proof-of-concept code available, enabling unauthorized access to sensitive hospital patient data, user credentials, and potential system compromise. With a CVSS score of 7.3 and an attack vector requiring only network access and no authentication, this represents an immediate threat to healthcare organizations running affected versions.

Technical Context

The vulnerability is a classic SQL injection flaw (CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component) in a PHP-based hospital management web application. The /user-login.php endpoint fails to properly sanitize or parameterize user-supplied input in the Username parameter before incorporating it into SQL queries. This allows attackers to inject SQL metacharacters and commands that alter query logic. PHPGurukul Hospital Management System 4.0 is a PHP application designed for hospital operations management; the affected version likely uses direct SQL query concatenation rather than prepared statements or parameterized queries. The technology stack involves PHP, likely MySQL or similar relational database backend, and web-based authentication mechanisms.

Affected Products

PHPGurukul Hospital Management System version 4.0 is the confirmed affected version. The vulnerability specifically impacts the /user-login.php file. No CPE strings were provided in the source data, but the affected product can be identified as: 'PHPGurukul Hospital Management System' (vendor: PHPGurukul/Open Source, product: Hospital Management System, version: 4.0). Healthcare organizations deploying this open-source system are at risk. Affected configurations include default installations where the /user-login.php endpoint is exposed to network access without additional authentication layers or WAF protections.

Remediation

Immediate Actions: (1) Patch/Upgrade - Update PHPGurukul Hospital Management System to version 5.0 or later if available; verify patch availability from PHPGurukul official repositories or GitHub; (2) If no patch is available - implement prepared statements with parameterized queries for all database operations in /user-login.php, replacing direct SQL concatenation; (3) Input Validation - Implement strict whitelist validation on the Username parameter (alphanumeric only, maximum length enforcement); (4) Web Application Firewall - Deploy WAF rules blocking common SQL injection payloads (single quotes, SQL keywords like UNION, OR 1=1); (5) Access Controls - Restrict network access to /user-login.php to expected user groups; use reverse proxy authentication; (6) Database Hardening - Apply principle of least privilege to database user accounts used by the application; disable dangerous functions like exec() in PHP; (7) Monitoring - Implement logging and alerting for failed SQL queries and suspicious authentication attempts. Vendor advisory should be checked at PHPGurukul's official channels or GitHub repository for official patch status.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

CVE-2025-7604 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy