CVE-2026-3980

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in Online Doctor Appointment System 1.0 allows attackers to manipulate database queries through the patient_id parameter in /admin/patient_action.php. Attackers can potentially read, modify, or delete sensitive medical appointment data. All deployments of version 1.0 are affected.

💻 Affected Systems

Products:
  • itsourcecode Online Doctor Appointment System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to exposure of all patient medical records, appointment details, and admin credentials, potentially enabling full system takeover.

🟠

Likely Case

Unauthorized access to patient appointment data, modification of appointment records, and potential extraction of sensitive information from the database.

🟢

If Mitigated

Limited data exposure if proper input validation and database permissions are in place, with minimal impact on system availability.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic SQL injection knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://itsourcecode.com/

Restart Required: No

Instructions:

No official patch available. Implement parameterized queries and input validation in /admin/patient_action.php to sanitize patient_id parameter.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with SQL injection protection rules to block malicious requests to /admin/patient_action.php

Input Validation Filter

all

Add server-side validation to only accept numeric values for patient_id parameter

Add PHP validation: if(!is_numeric($_POST['patient_id'])) { die('Invalid input'); }

🧯 If You Can't Patch

  • Restrict access to /admin/ directory to trusted IP addresses only
  • Disable the vulnerable system and migrate to a secure alternative

🔍 How to Verify

Check if Vulnerable:

Test the patient_id parameter in /admin/patient_action.php with SQL injection payloads like ' OR '1'='1

Check Version:

Check system documentation or configuration files for version information

Verify Fix Applied:

Verify that SQL injection payloads no longer work and return error messages or are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed login attempts or parameter manipulation in /admin/patient_action.php

Network Indicators:

  • SQL keywords in HTTP POST requests to /admin/patient_action.php
  • Unusual database query patterns

SIEM Query:

source="web_logs" AND uri="/admin/patient_action.php" AND (request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT" OR request_body CONTAINS "OR '1'='1'")

🔗 References

📤 Share & Export