CVE-2026-5960
Information Disclosure via Remote Exploit in Patient Record SQL Backup
Publication date: 2026-04-09
Last updated on: 2026-04-09
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability leads to the exposure of sensitive patient medical records, personally identifiable information (PII), and administrator credentials due to an improperly secured SQL database backup file accessible without authentication.
Such unauthorized disclosure of sensitive health and personal data can result in violations of data protection regulations and standards like GDPR and HIPAA, which mandate strict controls over the confidentiality and security of personal and health information.
Failure to secure backup files and prevent unauthorized access can lead to non-compliance with these regulations, potentially resulting in legal penalties, loss of trust, and harm to affected individuals.
Can you explain this vulnerability to me?
This vulnerability exists in the Patient Record Management System 1.0 due to an exposed SQL database backup file named hcpms.sql stored in a publicly accessible directory within the web root.
Because of improper server configuration, any remote attacker can directly access and download this SQL backup file without authentication or authorization.
The exposed SQL file contains the entire database structure and sensitive data such as patient medical records, administrator credentials (including plaintext passwords), user account information, and personally identifiable information (PII).
This vulnerability is classified as a Sensitive Information Disclosure (CWE-200) and is caused by security misconfiguration, specifically storing backup files inside the web root and allowing direct access to .sql files.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to unauthorized disclosure of sensitive information, including patient medical records and administrator credentials.
Attackers can steal credentials, potentially leading to account takeover and full database compromise.
This can result in privacy violations, further targeted attacks, and loss of trust in the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the SQL database backup file (hcpms.sql) is publicly accessible via a URL on the web server. An attacker can directly download the database dump without authentication if the file is exposed in the web root.
To detect this on your system, you can attempt to access the backup file using a web browser or command-line tools such as curl or wget to see if the file is accessible.
- curl -I http://yourserver/HCPMS%20PHP/Health%20Care%20Patient%20Record%20Management%20System/db/hcpms.sql
- wget --spider http://yourserver/HCPMS%20PHP/Health%20Care%20Patient%20Record%20Management%20System/db/hcpms.sql
Additionally, you can scan your web server directories for exposed .sql files or check web server logs for any requests to .sql files.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include removing the backup files from the web root directory and storing them in a non-public directory such as /var/backups/.
You should restrict access to .sql files via web server configuration to prevent direct access. For example:
- For Apache: use `<Files "*.sql"> Require all denied </Files>` in the server configuration.
- For Nginx: use `location ~* \.sql$ { deny all; }` in the server configuration.
Other important steps include disabling directory listing, applying strict file permissions, securing backup storage to allow access only to authorized administrators, and regularly auditing the server for exposed files.