Description
A vulnerability has been found in SourceCodester Simple Doctors Appointment System up to 1.0. This issue affects some unknown processing of the file /doctors_appointment/admin/ajax.php?action=save_category. Such manipulation of the argument img leads to unrestricted upload. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Published: 2026-03-31
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted file upload with potential remote code execution
Action: Patch Immediately
AI Analysis

Impact

The Simple Doctors Appointment System has an issue in its category‑save endpoint (/doctors_appointment/admin/ajax.php?action=save_category) where the img parameter is stored without proper validation or filtering. An attacker can supply any file and the system will store it, allowing upload of executable or web script files. This undermines file‑type security controls and can enable remote code execution if the uploaded file is then accessed via the web, leading to compromise of application confidentiality, integrity, and availability.

Affected Systems

The vulnerability affects SourceCodester’s Simple Doctors Appointment System, any release version up to and including 1.0. No later versions have been reported as affected, and the issue resides specifically in the ajax.php script used for category creation.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. The attack vector can be performed from a remote network through an HTTP POST containing a crafted image field. Once a file is uploaded, if the web server allows execution of that file type, an attacker can achieve remote code execution. The lack of server‑side restrictions means the condition for exploitation is minimal: simply contacting the endpoint with a malicious payload. This represents a clear and actionable risk in environments where the application is exposed to the internet.

Generated by OpenCVE AI on March 31, 2026 at 06:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the application to a newer version that removes the vulnerable endpoint.
  • If an upgrade is not immediately available, configure the server to accept only image MIME types and reject any executable files for the img upload.
  • Store uploaded files outside the web document root and ensure that the upload directory has script execution disabled.
  • Deploy web‑application firewall rules that block known upload abuse patterns and limit file size.
  • Validate the implementation by attempting to upload a non‑image file and confirming it is rejected and that the upload folder is non‑executable.

Generated by OpenCVE AI on March 31, 2026 at 06:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester simple Doctors Appointment System
Vendors & Products Sourcecodester
Sourcecodester simple Doctors Appointment System

Tue, 31 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in SourceCodester Simple Doctors Appointment System up to 1.0. This issue affects some unknown processing of the file /doctors_appointment/admin/ajax.php?action=save_category. Such manipulation of the argument img leads to unrestricted upload. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Title SourceCodester Simple Doctors Appointment System ajax.php unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Simple Doctors Appointment System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T15:36:15.911Z

Reserved: 2026-03-30T18:59:02.832Z

Link: CVE-2026-5181

cve-icon Vulnrichment

Updated: 2026-03-31T15:36:12.386Z

cve-icon NVD

Status : Deferred

Published: 2026-03-31T05:16:12.357

Modified: 2026-04-24T18:11:16.583

Link: CVE-2026-5181

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:10:30Z

Weaknesses