A vulnerability, which was classified as critical, has been found in Campcodes Online Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /hms/forgot-password.php. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/ASantsSec/CVE/issues/11 | Exploit Third Party Advisory Issue Tracking |
https://github.com/ASantsSec/CVE/issues/11 | Exploit Third Party Advisory Issue Tracking |
https://vuldb.com/?ctiid.313400 | Permissions Required VDB Entry |
https://vuldb.com/?id.313400 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.598204 | Third Party Advisory VDB Entry |
https://www.campcodes.com/ | Product |
Configurations
History
24 Jun 2025, 19:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Campcodes online Hospital Management System
Campcodes |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-89 | |
CPE | cpe:2.3:a:campcodes:online_hospital_management_system:1.0:*:*:*:*:*:*:* | |
References | () https://vuldb.com/?ctiid.313400 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.313400 - Third Party Advisory, VDB Entry | |
References | () https://www.campcodes.com/ - Product | |
References | () https://vuldb.com/?submit.598204 - Third Party Advisory, VDB Entry | |
References | () https://github.com/ASantsSec/CVE/issues/11 - Exploit, Third Party Advisory, Issue Tracking |
23 Jun 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE | CWE-74 |
21 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-21 14:15
Updated : 2025-06-24 19:09
NVD link : CVE-2025-6406
Mitre link : CVE-2025-6406
JSON object : View
Products Affected
campcodes
- online_hospital_management_system
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')