VYPR
Medium severity6.3NVD Advisory· Published Apr 10, 2026· Updated Apr 29, 2026

CVE-2026-6006

CVE-2026-6006

Description

A vulnerability has been found in code-projects Patient Record Management System 1.0. The impacted element is an unknown function of the file /edit_hpatient.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An SQL injection vulnerability in the Patient Record Management System 1.0 allows remote attacker can exploit the ID parameter in /edit_hpatient.php.

Vulnerability

Analysis

The vulnerability resides in the file is /edit_hpatient.php, where the ID parameter is not properly sanitized before being used in a database query. This allows an attacker to inject arbitrary SQL commands through the ID argument. The root cause is a lack of input validation or parameterized queries in the application's database interaction layer [1].

Exploitation

The attack can be initiated remotely without requiring authentication, as the vulnerable endpoint is accessible to unauthenticated users. An attacker can send a crafted a malicious ID value that, when processed by the application, alters the intended SQL query structure. The exploit has been publicly disclosed, increasing the risk of widespread scanning and automated attacks [1].

Impact

Successful exploitation allows an attacker to read, modify, or delete sensitive data stored in the database. This could include patient records, login credentials, and other personally identifiable information. In some configurations, SQL injection can also lead to remote code execution or privilege escalation within the database server [1].

Mitigation

As of the publication date, no official patch has been released by the vendor (code-projects). The software appears to be a legacy or educational project, and the vendor may not provide security updates. Users are advised to implement input validation, use parameterized queries, or migrate to a supported alternative. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog at this time [2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.