SourceCodester Hospitals Patient Records Management System manage_history.php sql injection
Description
A vulnerability has been found in SourceCodester Hospitals Patient Records Management System 1.0. This affects an unknown function of the file /admin/patients/manage_history.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in SourceCodester Hospitals Patient Records Management System 1.0 allows remote attackers to execute arbitrary SQL queries via the 'id' parameter in /admin/patients/manage_history.php.
Vulnerability
A SQL injection vulnerability exists in SourceCodester Hospitals Patient Records Management System version 1.0. The flaw resides in the file /admin/patients/manage_history.php, where the id parameter is taken directly from the HTTP GET request and concatenated into SQL queries without proper sanitization or validation. This allows an attacker to inject malicious SQL statements. The vulnerability is present in the publicly available version 1.0 of the software [1].
Exploitation
An attacker can exploit this vulnerability remotely without requiring any authentication or prior authorization. The attack is performed by sending a crafted HTTP GET request to the vulnerable endpoint with a malicious payload in the id parameter. The reference includes a proof-of-concept payload that demonstrates time-based blind SQL injection, allowing the attacker to extract data character by character [1].
Impact
Successful exploitation enables an attacker to perform unauthorized database operations, including reading, modifying, or deleting sensitive patient records. The attacker can gain access to the entire database, potentially leading to data leakage, data tampering, and full system compromise. The impact extends to service interruption and loss of data integrity, posing a serious threat to the confidentiality and availability of the system [1].
Mitigation
As of the publication date, no official patch or fixed version has been released by SourceCodester. The vendor has not acknowledged the vulnerability or provided a security update. Until a fix is available, administrators should implement input validation and parameterized queries on the affected endpoint, restrict network access to the admin panel, and consider using a web application firewall (WAF) to block SQL injection attempts. The product may be end-of-life or unsupported, so migration to a maintained alternative is recommended [1].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/yan-124/yan/issues/1mitreexploitissue-tracking
- vuldb.com/submit/813022mitrethird-party-advisory
- vuldb.com/vuln/365319mitrevdb-entrytechnical-description
- vuldb.com/vuln/365319/ctimitresignaturepermissions-required
- www.sourcecodester.commitreproduct
News mentions
0No linked articles in our index yet.