Description
A vulnerability has been found in SourceCodester Medical Center Portal Management System 1.0. Affected is an unknown function of the file /emp_edit1.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Published: 2026-02-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to unauthorized data access or alteration
Action: Apply Patch
AI Analysis

Impact

A vulnerability in the SourceCodester Medical Center Portal Management System allows an attacker to manipulate the ID parameter in emp_edit1.php, enabling execution of arbitrary SQL statements. This flaw can compromise the confidentiality, integrity, and availability of the underlying database, allowing attackers to read, modify, or delete sensitive employee data.

Affected Systems

SourceCodester Medical Center Portal Management System version 1.0 is affected; no other versions are listed.

Risk and Exploitability

The CVSS score of 6.9 denotes a medium severity, while an EPSS score of less than 1% indicates a low likelihood of current exploitation. The vulnerability is not present in the CISA KEV catalog. The attack is likely remote, requiring an attacker to craft a request that passes a malicious ID value to the web page; no special privileges beyond access to the portal are required, so unauthenticated or lightly authenticated users could potentially exploit it.

Generated by OpenCVE AI on April 17, 2026 at 22:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the medical center portal management system to the latest patched release from SourceCodester.
  • If a patch is unavailable, modify emp_edit1.php to employ parameterized queries or stored procedures, ensuring that the ID input is properly validated and sanitized.
  • Restrict access to the employee edit functionality by enforcing strict authentication and role‑based access controls, and consider placing the application behind a firewall to limit external exposure.

Generated by OpenCVE AI on April 17, 2026 at 22:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Bontrofftech
Bontrofftech medical Center Portal Management System
CPEs cpe:2.3:a:bontrofftech:medical_center_portal_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Bontrofftech
Bontrofftech medical Center Portal Management System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester medical Center Portal Management System
Vendors & Products Sourcecodester
Sourcecodester medical Center Portal Management System

Fri, 06 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in SourceCodester Medical Center Portal Management System 1.0. Affected is an unknown function of the file /emp_edit1.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Title SourceCodester Medical Center Portal Management System emp_edit1.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bontrofftech Medical Center Portal Management System
Sourcecodester Medical Center Portal Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:26:16.347Z

Reserved: 2026-02-06T06:31:57.350Z

Link: CVE-2026-2059

cve-icon Vulnrichment

Updated: 2026-02-06T18:44:15.277Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T17:16:28.060

Modified: 2026-02-12T16:20:50.760

Link: CVE-2026-2059

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:45:29Z

Weaknesses