VYPR
Unrated severityNVD Advisory· Published May 24, 2026

SourceCodester Hospitals Patient Records Management System manage_history.php sql injection

CVE-2026-9356

Description

A vulnerability has been found in SourceCodester Hospitals Patient Records Management System 1.0. This affects an unknown function of the file /admin/patients/manage_history.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in SourceCodester Hospitals Patient Records Management System 1.0 allows remote attackers to execute arbitrary SQL queries via the 'id' parameter in /admin/patients/manage_history.php.

Vulnerability

A SQL injection vulnerability exists in SourceCodester Hospitals Patient Records Management System version 1.0. The flaw resides in the file /admin/patients/manage_history.php, where the id parameter is taken directly from the HTTP GET request and concatenated into SQL queries without proper sanitization or validation. This allows an attacker to inject malicious SQL statements. The vulnerability is present in the publicly available version 1.0 of the software [1].

Exploitation

An attacker can exploit this vulnerability remotely without requiring any authentication or prior authorization. The attack is performed by sending a crafted HTTP GET request to the vulnerable endpoint with a malicious payload in the id parameter. The reference includes a proof-of-concept payload that demonstrates time-based blind SQL injection, allowing the attacker to extract data character by character [1].

Impact

Successful exploitation enables an attacker to perform unauthorized database operations, including reading, modifying, or deleting sensitive patient records. The attacker can gain access to the entire database, potentially leading to data leakage, data tampering, and full system compromise. The impact extends to service interruption and loss of data integrity, posing a serious threat to the confidentiality and availability of the system [1].

Mitigation

As of the publication date, no official patch or fixed version has been released by SourceCodester. The vendor has not acknowledged the vulnerability or provided a security update. Until a fix is available, administrators should implement input validation and parameterized queries on the affected endpoint, restrict network access to the admin panel, and consider using a web application firewall (WAF) to block SQL injection attempts. The product may be end-of-life or unsupported, so migration to a maintained alternative is recommended [1].

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.