CVE-2026-5181
Received Received - Intake
Unrestricted File Upload in Simple Doctors Appointment System

Publication date: 2026-03-31

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in SourceCodester Simple Doctors Appointment System up to 1.0. This issue affects some unknown processing of the file /doctors_appointment/admin/ajax.php?action=save_category. Such manipulation of the argument img leads to unrestricted upload. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sourcecodester simple_doctors_appointment_system to 1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5181 is a critical file upload vulnerability found in the Simple Doctor's Appointment System version 1.0. It exists in the file `/doctors_appointment/admin/ajax.php` when accessed with the parameter `action=save_category`. The application does not properly sanitize or filter the uploaded files, allowing attackers to upload arbitrary and potentially dangerous file types.

This unrestricted file upload flaw can be exploited remotely, enabling attackers to upload malicious files that may lead to remote code execution within the application's environment.


How can this vulnerability impact me? :

The vulnerability can lead to remote code execution, which compromises the confidentiality, integrity, and availability of the affected system.

  • Attackers can upload arbitrary files, potentially gaining unauthorized access or control over the system.
  • The uploaded malicious files can be executed remotely, leading to system compromise.
  • This can result in data breaches, service disruption, or further exploitation of the system.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the file upload functionality at the endpoint /doctors_appointment/admin/ajax.php?action=save_category to see if arbitrary files can be uploaded without proper validation.

One way to detect it is to attempt uploading a harmless test file (e.g., a simple text or PHP file) via this endpoint and then check if the file is accessible on the server or website.

You can use command-line tools like curl to test the upload, for example:

  • curl -F "[email protected]" "http://targetsite/doctors_appointment/admin/ajax.php?action=save_category"

After uploading, verify if the file is accessible by navigating to the expected upload directory on the website.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or restricting file uploads at the vulnerable endpoint until a proper fix is applied.

Implement strict validation and sanitization of uploaded files, ensuring only allowed file types and sizes are accepted.

Restrict permissions on upload directories to prevent execution of uploaded files.

Monitor the server and web application logs for suspicious upload attempts or access to uploaded files.

Apply any available patches or updates from the vendor or developer addressing this vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unrestricted file upload leading to potential remote code execution, which compromises the confidentiality, integrity, and availability of the system.

Such a compromise can result in unauthorized access to sensitive data, which may violate common standards and regulations like GDPR and HIPAA that require protection of personal and health information.

Therefore, this vulnerability could negatively impact compliance with these regulations by exposing protected data to unauthorized parties and failing to maintain adequate security controls.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart