CVE-2025-64081
SourceCodester · SourceCodester Patients Waiting Area Queue Management System
A critical SQL injection vulnerability has been identified in the SourceCodester Patients Waiting Area Queue Management System.
Executive summary
A critical SQL injection vulnerability has been identified in the SourceCodester Patients Waiting Area Queue Management System. This flaw allows an unauthenticated remote attacker to execute arbitrary commands on the application's database, potentially leading to a complete compromise of sensitive patient data, system disruption, and a significant data breach.
Vulnerability
The vulnerability exists within the /php/api_patient_schedule.php script, which fails to properly sanitize user-supplied input for the appointmentID parameter. An attacker can inject malicious SQL queries into this parameter when making a request to the server. Successful exploitation allows the attacker to bypass authentication, read, modify, or delete data in the backend database, and potentially gain control over the underlying server depending on the database user's privileges.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a severe impact on the business, leading to the unauthorized disclosure of sensitive patient health information, which would likely result in significant regulatory fines (e.g., under HIPAA), legal action, and severe reputational damage. Furthermore, an attacker could manipulate or delete patient records and appointment data, causing major disruption to healthcare operations and compromising data integrity.
Remediation
Immediate Action: Update the SourceCodester Patients Waiting Area Queue Management System to the latest version provided by the vendor to patch this vulnerability. After patching, monitor for any signs of post-compromise activity and review historical access logs for potential exploitation attempts targeting /php/api_patient_schedule.php.
Proactive Monitoring: Review web server and database logs for suspicious queries or requests targeting the appointmentID parameter, looking for common SQL injection syntax (e.g., OR 1=1, UNION SELECT, SLEEP()). Implement a Web Application Firewall (WAF) to detect and block SQL injection attack patterns in real-time.
Compensating Controls: If immediate patching is not feasible, deploy a WAF with specific rules to filter and block malicious requests to the vulnerable /php/api_patient_schedule.php endpoint. Restrict network access to the application to only trusted IP ranges and ensure the database service account operates with the principle of least privilege to limit the impact of a potential compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the critical severity (CVSS 9.8) of this vulnerability, immediate action is required. We strongly recommend that all instances of the affected software be patched immediately to prevent a potential data breach. If patching is delayed, the compensating controls outlined above must be implemented as a matter of urgency. Although this CVE is not currently on the CISA KEV list, its critical nature makes it a prime candidate for inclusion if widespread exploitation is observed.