Impact
A flaw in SourceCodester Simple Doctors Appointment System allows manipulation of the 'email' argument in the /admin/ajax.php?action=login2 endpoint to inject arbitrary SQL commands. This vulnerability can enable an attacker to read, modify, or delete data in the underlying database, potentially exposing sensitive patient information or compromising the integrity of appointment records. The weakness is a classic SQL injection (CWE-74 and CWE-89).
Affected Systems
The affected product is SourceCodester Simple Doctors Appointment System version 1.0. The vulnerability resides in the /admin/ajax.php script handling the login2 action. No other versions or components are listed as affected.
Risk and Exploitability
The CVSS base score is 6.9, indicating moderate severity. No EPSS score is available and the vulnerability is not listed in CISA's KEV catalog, suggesting limited known exploitation or supply chain risk. Attackers can exploit the issue remotely by sending a crafted 'email' parameter to the login2 endpoint, possibly bypassing authentication or reading confidential data. There is no official workaround, so remediation depends on applying a vendor patch or secure coding changes.
OpenCVE Enrichment