Description
A vulnerability has been found in PicoTronica e-Clinic Healthcare System ECHS 5.7. This affects an unknown function of the file /cdemos/echs/api/v2/ of the component Response Header Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. Upgrading to version 5.7.1 mitigates this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Published: 2026-05-06
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw exists in the Response Header Handler of PicoTronica e-Clinic Healthcare System ECHS 5.7. The handler, invoked through requests to /cdemos/echs/api/v2/, fails to validate or control the content of HTTP response headers, allowing an attacker to induce the disclosure of sensitive data such as patient information or system configuration. This breach aligns with CWE-200 (Information Exposure) and CWE-284 (Improper Access Control), and can expose confidential data to unauthenticated parties.

Affected Systems

The affected product is PicoTronica e-Clinic Healthcare System ECHS, version 5.7. The vulnerability resides in the Response Header Handler component handling API requests at /cdemos/echs/api/v2/. Upgrading the installation to version 5.7.1 removes the flaw.

Risk and Exploitability

The CVSS score of 6.9 classifies the vulnerability as moderate severity. The attack is remediable from a remote environment using standard HTTP requests, and the advisory confirms that the exploit is publicly disclosed. EPSS data is unavailable, so the exploitation likelihood cannot be quantified, while the vulnerability is not currently listed in the CISA KEV catalog. Despite the lack of documented large‑scale attacks, the information disclosure could allow attackers to obtain data, potentially serving as a foothold for further compromise.

Generated by OpenCVE AI on May 6, 2026 at 20:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PicoTronica e-Clinic Healthcare System ECHS to version 5.7.1 or later.
  • Configure the API to require authenticated access and restrict response headers to non‑sensitive fields.
  • Implement server‑side filtering of response header values to eliminate any inadvertent disclosure of confidential information.

Generated by OpenCVE AI on May 6, 2026 at 20:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in PicoTronica e-Clinic Healthcare System ECHS 5.7. This affects an unknown function of the file /cdemos/echs/api/v2/ of the component Response Header Handler. Such manipulation leads to information disclosure. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. Upgrading to version 5.7.1 mitigates this issue. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Title PicoTronica e-Clinic Healthcare System ECHS Response Header v2 information disclosure
Weaknesses CWE-200
CWE-284
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-06T19:30:16.794Z

Reserved: 2026-05-06T12:17:17.895Z

Link: CVE-2026-8033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T20:16:36.360

Modified: 2026-05-06T20:16:36.360

Link: CVE-2026-8033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T20:45:05Z

Weaknesses