Description
A vulnerability has been found in code-projects Patient Record Management System 1.0. The impacted element is an unknown function of the file /edit_hpatient.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection allowing unauthorized data access and potential modification
Action: Immediate Patch
AI Analysis

Impact

An SQL injection vulnerability exists in the /edit_hpatient.php file of code-projects Patient Record Management System 1.0, where the ID argument is not properly validated. The flaw permits an attacker to inject arbitrary SQL through the ID parameter and manipulate database queries. The impact is the unauthorized disclosure of patient records, modification or deletion of sensitive data, and potential escalation to broader system compromise due to the nature of database access.

Affected Systems

The affected software is code-projects Patient Record Management System version 1.0, deployed by organizations that host the application. No other vendors or product versions are listed as impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the vulnerability is exploitable remotely as the attack can be initiated from outside the network. The EPSS score is not available and the issue is not in the CISA KEV catalog, but the fact that the exploit has been publicly disclosed means that threat actors could target vulnerable installations. An attacker who can craft requests to edit_hpatient.php with a malicious ID value can gain unauthorized read/write access to the underlying database.

Generated by OpenCVE AI on April 10, 2026 at 04:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the code‑projects website or repository for an available patch or updated version of the Patient Record Management System and apply it immediately.
  • If no patch is available, modify the application code to use prepared statements or proper input validation on the ID parameter to prevent SQL injection.
  • As a temporary protective measure, configure a web application firewall to block suspicious requests targeting the edit_hpatient.php endpoint with anomalous ID values.

Generated by OpenCVE AI on April 10, 2026 at 04:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 03:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Patient Record Management System 1.0. The impacted element is an unknown function of the file /edit_hpatient.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Patient Record Management System edit_hpatient.php sql injection
First Time appeared Code-projects
Code-projects patient Record Management System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:patient_record_management_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects patient Record Management System
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Patient Record Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T17:04:11.688Z

Reserved: 2026-04-09T13:27:17.887Z

Link: CVE-2026-6006

cve-icon Vulnrichment

Updated: 2026-04-10T17:04:06.572Z

cve-icon NVD

Status : Deferred

Published: 2026-04-10T04:17:23.420

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6006

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:58Z

Weaknesses