Impact
The vulnerability allows attackers to send crafted GET requests to the users_select.php endpoint, exploiting an SQL injection flaw that lets them execute arbitrary SQL commands. This can expose sensitive database contents, including patient records and system credentials, thereby compromising confidentiality.
Affected Systems
C4G Basic Laboratory Information System (BLIS) version 3.4 is affected; no later versions are listed.
Risk and Exploitability
The CVSS score of 8.8 classifies this as a high severity flaw. Attackers can exploit it remotely over the web without authentication, making it readily actionable. The EPSS score of 0.00059 (approximately <1%) indicates a very low exploitation likelihood, and the issue is not currently included in the CISA KEV catalog, but the high score and unauthenticated nature still indicate a significant risk of exploitation.
OpenCVE Enrichment