Description
A security vulnerability has been detected in PHPGurukul Hospital Management System 4.0. The affected element is an unknown function of the file /hms/admin/manage-doctors.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Published: 2026-02-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection via /hms/admin/manage-doctors.php
Action: Apply Patch
AI Analysis

Impact

The PHPGurukul Hospital Management System 4.0 contains a flaw in an unreferenced function within manage-doctors.php that allows an attacker to manipulate the ID parameter and perform SQL injection. This vulnerability can enable unauthorized data extraction or modification in the underlying database. The flaw is a typical SQL injection weakness, listed as CWE‑89 and CWE‑74, and can compromise the confidentiality and integrity of patient records and administrative data.

Affected Systems

The affected vendor is PHPGurukul, specifically version 4.0 of the Hospital Management System. No alternative products are listed, and the vulnerability applies to all installations that expose the /hms/admin/manage-doctors.php endpoint without additional access controls.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity, while the EPSS score of less than 1% suggests low current exploitation probability. The vulnerability is not in the CISA KEV catalog, implying no known widespread exploitation at present. The most likely attack vector is remote, as the description states the attack may be performed from outside the internal network. An attacker would need network reach to the web application, but once accessed could inject arbitrary SQL through the ID parameter, potentially exfiltrating sensitive data or altering database contents.

Generated by OpenCVE AI on April 17, 2026 at 22:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update PHPGurukul Hospital Management System to a patched or later version that removes the vulnerable code.
  • If a patch is not yet available, limit access to /hms/admin/manage-doctors.php so only trusted administrators can reach it, using network firewalls or HTTP authentication.
  • Modify the code to validate the ID parameter rigorously—enforce numeric-only input or employ prepared statements to prevent injection.
  • Implement a web application firewall rule to block common SQL injection payload patterns targeting the manage‑doctors.php endpoint.

Generated by OpenCVE AI on April 17, 2026 at 22:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:hospital_management_system:*:*:*:*:*:*:*:*

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul hospital Management System
Vendors & Products Phpgurukul
Phpgurukul hospital Management System

Sun, 08 Feb 2026 04:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in PHPGurukul Hospital Management System 4.0. The affected element is an unknown function of the file /hms/admin/manage-doctors.php. Such manipulation of the argument ID leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Title PHPGurukul Hospital Management System manage-doctors.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul Hospital Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:37:51.799Z

Reserved: 2026-02-06T20:57:09.870Z

Link: CVE-2026-2134

cve-icon Vulnrichment

Updated: 2026-02-10T19:48:17.386Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T05:16:04.353

Modified: 2026-02-11T18:54:59.870

Link: CVE-2026-2134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:00:11Z

Weaknesses