CVE-2025-70063

6.5 MEDIUM

📋 TL;DR

This IDOR vulnerability in PHPGurukul Hospital Management System allows authenticated users to access other patients' confidential medical records by manipulating the 'viewid' parameter. Any healthcare organization using the vulnerable version is affected, potentially exposing sensitive patient health information.

💻 Affected Systems

Products:
  • PHPGurukul Hospital Management System
Versions: v4.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of v4.0 regardless of configuration. Requires authenticated user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass data breach of all patient medical records, leading to regulatory fines, lawsuits, and reputational damage for the healthcare provider.

🟠

Likely Case

Targeted access to specific patients' medical records by malicious insiders or compromised accounts, violating patient privacy and confidentiality.

🟢

If Mitigated

Limited exposure if proper access controls and parameter validation are implemented, restricting users to only their own records.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is trivial via parameter manipulation. Public proof-of-concept demonstrates the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Implement workarounds or upgrade to a secure version if released by vendor.

🔧 Temporary Workarounds

Implement server-side access control

all

Add server-side validation to ensure 'viewid' parameter matches the authenticated patient's ID before returning data.

Modify PHP code in Medical History module to compare session user ID with requested viewid

Implement parameter validation middleware

all

Add middleware that validates all object reference parameters against user permissions.

Create validation function that checks user permissions for each requested resource

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block suspicious parameter manipulation patterns
  • Enable detailed logging of all medical record access attempts and implement alerting for unusual access patterns

🔍 How to Verify

Check if Vulnerable:

Authenticate as a patient, access your medical record, then modify the 'viewid' parameter in the URL to another patient's ID. If successful, system is vulnerable.

Check Version:

Check system version in admin panel or review PHPGurukul installation files for version information

Verify Fix Applied:

After implementing fixes, attempt the same parameter manipulation. Access should be denied with proper error handling.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed access attempts to different patient IDs from same user session
  • Rapid sequential access to incrementing viewid parameters

Network Indicators:

  • HTTP requests with manipulated viewid parameters
  • Unusual pattern of medical record access from single IP/user

SIEM Query:

source="web_logs" AND (url="*viewid=*" AND NOT user_id=viewid) | stats count by src_ip, user_id

🔗 References

📤 Share & Export