CVE-2025-3348
📋 TL;DR
A critical SQL injection vulnerability in code-projects Patient Record Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter in /edit_dpatient.php. This can lead to unauthorized data access, modification, or deletion of patient records. All installations of version 1.0 are affected.
💻 Affected Systems
- code-projects Patient Record Management System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including patient record theft, system takeover via privilege escalation, and potential data destruction
Likely Case
Unauthorized access to patient records, data exfiltration, and potential manipulation of medical data
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages visible
🎯 Exploit Status
Exploit details are publicly available on GitHub, making this easily weaponizable
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Web Application Firewall (WAF)
allDeploy WAF rules to block SQL injection patterns targeting /edit_dpatient.php
Input Validation Filter
allAdd server-side input validation to sanitize ID parameter before processing
Example PHP: $id = filter_var($_GET['ID'], FILTER_SANITIZE_NUMBER_INT);
🧯 If You Can't Patch
- Block external access to /edit_dpatient.php via firewall rules
- Implement database user with minimal permissions (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test /edit_dpatient.php with SQL injection payloads like: /edit_dpatient.php?ID=1' OR '1'='1
Check Version:
Check software version in admin panel or configuration files
Verify Fix Applied:
Verify input validation rejects SQL injection attempts and returns proper error handling
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in web server logs
- Unusual database queries from web application user
- Multiple failed login attempts following SQL errors
Network Indicators:
- HTTP requests to /edit_dpatient.php with SQL keywords in parameters
- Unusual database port traffic from web server
SIEM Query:
source="web_logs" AND uri="/edit_dpatient.php" AND (param="ID" AND value MATCHES "'.*'|OR|UNION|SELECT")