CVE-2025-5584
PHPGurukul Hospital Management System POST Parameter edit-patient.php cross site scripting
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been classified as problematic. Affected is an unknown function of the file /doctor/edit-patient.php?editid=2 of the component POST Parameter Handler. The manipulation of the argument patname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Se encontró una vulnerabilidad en PHPGurukul Hospital Management System 4.0. Se ha clasificado como problemática. Se ve afectada una función desconocida del archivo /doctor/edit-patient.php?editid=2 del componente POST Parameter Handler. La manipulación del argumento "patname" provoca ataques de cross site scripting. Es posible ejecutar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado.
Es wurde eine problematische Schwachstelle in PHPGurukul Hospital Management System 4.0 ausgemacht. Hiervon betroffen ist ein unbekannter Codeblock der Datei /doctor/edit-patient.php?editid=2 der Komponente POST Parameter Handler. Durch Beeinflussen des Arguments patname mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2025-06-03 CVE Reserved
- 2025-06-04 CVE Published
- 2025-06-04 CVE Updated
- 2025-06-04 First Exploit
- 2025-07-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://phpgurukul.com | Product | |
https://vuldb.com/?id.311046 | Technical Description | |
https://vuldb.com/?submit.588828 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/Ant1sec-ops/Hospital-management-Systemv4.0-Stored-XSS/blob/main/stored-xss-exploit.md | 2025-06-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
PHPGurukul Search vendor "PHPGurukul" | Hospital Management System Search vendor "PHPGurukul" for product "Hospital Management System" | 4.0 Search vendor "PHPGurukul" for product "Hospital Management System" and version "4.0" | en |
Affected
|