CVE Alert: CVE-2025-9770 – Campcodes – Hospital Management System

CVE-2025-9770

HIGHNo exploitation known

A weakness has been identified in Campcodes Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ of the component Admin Dashboard Login. This manipulation of the argument Password causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited.

CVSS v3.1 (7.3)
Vendor
Campcodes
Product
Hospital Management System
Versions
1.0
CWE
CWE-89, SQL Injection
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-01T08:32:08.647Z
Updated
2025-09-01T08:32:08.647Z

AI Summary Analysis

Risk verdict

High risk: a publicly available exploit enables remote SQL injection on the admin login, potentially allowing unauthenticated access to data.

Why this matters

In a hospital-management context, SQL injection at an admin entry point can expose patient records, appointments, and financial data, with potential credential access and system modification. The mix of high CVSS scores (3.x with HIGH impact) and a publicly disclosed exploit suggests attackers may actively attempt abuse, risking data integrity, confidentiality, and availability.

Most likely attack path

No user interaction required; attacker can target the login over the network with crafted input (Password parameter). With PR:N and UI:N, exploitation relies on network access and low complexity, potentially yielding data access or modification from the database. Scope remains local to the application DB, but successful data exposure can enable credential harvesting and lateral movement if linked services trust the compromised DB.

Who is most exposed

Organizations operating internet-facing admin dashboards for hospital management systems, especially small-to-mid sized clinics or on-prem/cloud deployments with public access, are most at risk.

Detection ideas

  • Anomalous login payloads containing SQL syntax (UNION, SELECT, quotes) in /admin endpoints.
  • Increased login failures with unusual error messages or database errors in logs.
  • Unusual data retrieval patterns from admin DB; spikes in data volume from admin interfaces.
  • WAF/signature hits for SQLi payloads; repeated access from single IPs targeting /admin.

Mitigation and prioritisation

  • Apply vendor patch or upgrade to non-vulnerable build; verify fixes in a test environment.
  • Implement parameterised queries and input validation; disable or tightly restrict remote admin access; adopt least-privilege DB accounts.
  • Deploy application-layer and network protections (WAF rules for SQLi, IP allowlists, MFA for admin accounts where feasible).
  • Monitor and alert on suspicious admin-login activity and SQL error messages; enforce change-management windows for patches.
  • If KEV confirmed or EPSS ≥ 0.5, treat as priority 1. If not known, maintain high-priority patching and compensating controls until clarified.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.