Impact
The vulnerability resides in the check_profile_old.php file of the E-Logbook with Health Monitoring System for COVID-19. An attacker can manipulate the profile_id argument to inject arbitrary SQL statements. Successful exploitation can lead to unauthorized read or modification of the database, potentially exposing sensitive health data or corrupting records.
Affected Systems
Affected systems include the vendor itsourcecode's E-Logbook with Health Monitoring System for COVID-19 version 1.0. The issue arises in an unknown code block within the check_profile_old.php script.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and the EPSS score below 1% shows a low probability of current exploitation. The vulnerability is not listed in KEV. Remote exploitation is feasible by sending crafted requests to the vulnerable endpoint. The attack vector appears to rely on external network access to the web application.
OpenCVE Enrichment