CVE-2025-57254
Description
An SQL injection vulnerability in user-login.php and index.php of Karthikg1908 Hospital Management System (HMS) 1.0 allows remote attackers to execute arbitrary SQL queries via the username and password POST parameters. The application fails to properly sanitize input before embedding it into SQL queries, leading to unauthorized access or potential data breaches. This can result in privilege escalation, account takeover, or exposure of sensitive medical data.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in Hospital Management System 1.0 allows unauthenticated attackers to execute arbitrary SQL queries via login and contact form parameters.
CVE-2025-57254 describes an SQL injection vulnerability in the Karthikg1908 Hospital Management System (HMS) version 1.0. The flaw resides in the user-login.php and index.php scripts, where user-supplied input from the username, password, and contact form fields (fullname, emailid, mobileno, description) is directly concatenated into SQL queries without proper sanitization or parameterization. This allows an attacker to inject malicious SQL code.
Exploitation is straightforward and does not require authentication. An attacker can send crafted POST requests to the login endpoint or the contact form submission endpoint. For example, injecting a SQL payload into the username or password fields can bypass authentication or extract data. The vendor's code snippet for index.php shows direct insertion of variables into an INSERT statement, confirming the lack of prepared statements. [1] details the proof-of-concept and affected endpoints.
The impact is significant: an attacker can achieve unauthorized access to the application, escalate privileges, perform account takeover, or exfiltrate sensitive medical data. The system stores patient information, diagnosis details, and other confidential records, making this a critical data breach risk. [2] provides the source code repository, which reveals the vulnerable pattern across multiple files.
As of the publication date (2025-09-30), no official patch has been released. The vendor has not responded to the disclosure. Users are advised to immediately implement input validation and parameterized queries, or consider migrating to a secure alternative. The vulnerability has been published with a proof-of-concept, increasing the risk of exploitation.
- research-and-development/CVE-2025-57254 at main · ischyr/research-and-development
- GitHub - Karthikg1908/Hospital-Management-System: The purpose of the project entitled as “HOSPITAL MANAGEMENT SYSTEM” is to computerize the Front Office Management of Hospital to develop software which is user friendly simple, fast, and cost – effective. It deals with the collection of patient’s information, diagnosis details, etc.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.