CVE-2026-5960
Received Received - Intake
Information Disclosure via Remote Exploit in Patient Record SQL Backup

Publication date: 2026-04-09

Last updated on: 2026-04-09

Assigner: VulDB

Description
A weakness has been identified in code-projects Patient Record Management System 1.0. This affects an unknown part of the file /db/hcpms.sql of the component SQL Database Backup File Handler. Executing a manipulation can lead to information disclosure. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-09
Last Modified
2026-04-09
Generated
2026-05-06
AI Q&A
2026-04-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability leads to the exposure of sensitive patient medical records, personally identifiable information (PII), and administrator credentials due to an improperly secured SQL database backup file accessible without authentication.

Such unauthorized disclosure of sensitive health and personal data can result in violations of data protection regulations and standards like GDPR and HIPAA, which mandate strict controls over the confidentiality and security of personal and health information.

Failure to secure backup files and prevent unauthorized access can lead to non-compliance with these regulations, potentially resulting in legal penalties, loss of trust, and harm to affected individuals.


Can you explain this vulnerability to me?

This vulnerability exists in the Patient Record Management System 1.0 due to an exposed SQL database backup file named hcpms.sql stored in a publicly accessible directory within the web root.

Because of improper server configuration, any remote attacker can directly access and download this SQL backup file without authentication or authorization.

The exposed SQL file contains the entire database structure and sensitive data such as patient medical records, administrator credentials (including plaintext passwords), user account information, and personally identifiable information (PII).

This vulnerability is classified as a Sensitive Information Disclosure (CWE-200) and is caused by security misconfiguration, specifically storing backup files inside the web root and allowing direct access to .sql files.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to unauthorized disclosure of sensitive information, including patient medical records and administrator credentials.

Attackers can steal credentials, potentially leading to account takeover and full database compromise.

This can result in privacy violations, further targeted attacks, and loss of trust in the affected system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the SQL database backup file (hcpms.sql) is publicly accessible via a URL on the web server. An attacker can directly download the database dump without authentication if the file is exposed in the web root.

To detect this on your system, you can attempt to access the backup file using a web browser or command-line tools such as curl or wget to see if the file is accessible.

  • curl -I http://yourserver/HCPMS%20PHP/Health%20Care%20Patient%20Record%20Management%20System/db/hcpms.sql
  • wget --spider http://yourserver/HCPMS%20PHP/Health%20Care%20Patient%20Record%20Management%20System/db/hcpms.sql

Additionally, you can scan your web server directories for exposed .sql files or check web server logs for any requests to .sql files.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing the backup files from the web root directory and storing them in a non-public directory such as /var/backups/.

You should restrict access to .sql files via web server configuration to prevent direct access. For example:

  • For Apache: use `<Files "*.sql"> Require all denied </Files>` in the server configuration.
  • For Nginx: use `location ~* \.sql$ { deny all; }` in the server configuration.

Other important steps include disabling directory listing, applying strict file permissions, securing backup storage to allow access only to authorized administrators, and regularly auditing the server for exposed files.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart