CVE Alert: CVE-2025-8858 – Changing – Clinic Image System

CVE-2025-8858

HIGHNo exploitation known

Clinic Image System developed by Changing has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents.

CVSS v3.1 (7.5)
AV NETWORK · AC LOW · PR NONE · UI NONE · S UNCHANGED
Vendor
Changing
Product
Clinic Image System
Versions
0 lte 2.4.23.2131 | 1.5.* | 2.0.*
CWE
CWE-89, CWE-89 Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Published
2025-08-29T03:36:21.390Z
Updated
2025-08-29T03:36:21.390Z

AI Summary Analysis

Risk verdict

High risk with urgent remediation required due to unauthenticated remote SQL injection accessible over the network.

Why this matters

The vulnerability enables reading database contents without authentication, giving attackers access to potentially sensitive information. Combined with high confidentiality impact, this can lead to data exfiltration and regulatory or reputational damage. The exploitation surface is broad and does not require user interaction, increasing the likelihood of automated abuse.

Most likely attack path

Attackers can exploit via a crafted request to an exposed web endpoint over the network, using no privileges and no user interaction. The flaw’s low complexity makes automated SQL injection feasible, enabling data exfiltration and reconnaissance within the application’s data scope. With scope unchanged, the immediate risk is data visibility within the affected system rather than broader lateral movement unless additional flaws exist.

Who is most exposed

Healthcare organisations deploying such image-management software with internet-facing or broadly accessible interfaces are most at risk, especially if unpatched and running older branches.

Detection ideas

  • Increased SQL error messages or database exceptions in app logs.
  • Requests containing suspicious SQL-like input strings in parameters.
  • Spikes in read/query activity from web-facing endpoints.
  • WAF alerts for SQL injection patterns.
  • Anomalous data exposure requests or attempts to bypass authentication.

Mitigation and prioritisation

  • Apply the patch to versions after 2.4.23.2131.
  • Enforce parameterised queries and strong input validation; audit code paths handling user input.
  • Deploy targeted WAF rules and enhance monitoring for SQLi indicators.
  • Reduce exposure: restrict to trusted networks or require authentication/VPN; improve network segmentation.
  • Perform staged patch testing and post-implementation validation of data access controls and logging.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.