CVE-2025-9753
BaseFortify
Publication date: 2025-09-01
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| campcodes | online_hospital_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-9753 is a Cross-Site Scripting (XSS) vulnerability in the Campcodes Online Hospital Management System version 1.0, specifically in the Patient Search module. It occurs because the application does not properly validate or sanitize user input in the 'Search by Name/Mobile No' field, allowing attackers to inject malicious JavaScript code. This malicious code can then be executed in the victim's browser, potentially leading to unauthorized actions such as credential theft or session hijacking. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute arbitrary scripts in your browser when using the affected Patient Search module. This can lead to theft of credentials, hijacking of user sessions, or other malicious activities that compromise the security and integrity of your web application and user data. The attack requires user interaction and authentication but can be initiated remotely. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying the presence of the vulnerable Patient Search module, specifically the /admin/patient-search.php page. One method is to use Google dorking with queries such as "inurl:admin/patient-search.php" to find exposed instances. Additionally, testing the "Search by Name Mobile No" input field for reflected cross-site scripting by injecting benign script payloads and observing if they are executed can confirm the vulnerability. Network detection could involve monitoring HTTP requests to the vulnerable endpoint for suspicious input patterns indicative of XSS payloads. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the /admin/patient-search.php page to trusted users only, applying strict input validation and sanitization on the "Search by Name Mobile No" parameter to prevent script injection, and monitoring for suspicious activity targeting this endpoint. Since no known countermeasures or patches are documented, replacing the affected component with an alternative product is suggested. Additionally, educating users about the risk and disabling or limiting user interaction with the vulnerable feature can reduce exploitation risk. [2]