CVE Alert: CVE-2025-9775 – n/a – RemoteClinic

CVE-2025-9775

HIGHNo exploitation known

A vulnerability was found in RemoteClinic up to 2.0. Impacted is an unknown function of the file /staff/edit-my-profile.php. The manipulation of the argument image results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used.

CVSS v3.1 (7.3)
Vendor
n/a
Product
RemoteClinic
Versions
2.0
CWE
CWE-434, Unrestricted Upload
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Published
2025-09-01T11:02:06.696Z
Updated
2025-09-01T11:02:06.696Z

AI Summary Analysis

Risk verdict

High risk: remotely exploitable without authentication and with a publicly disclosed exploit, so urgent remediation is advised.

Why this matters

Allows an attacker to upload arbitrary content via the image parameter, which could lead to server compromise if the uploaded file is executable. In healthcare settings, this risks data exposure, service disruption, and potential movement into adjacent systems, especially where upload features are internet-facing and poorly validated.

Most likely attack path

No user interaction or privileges are required; an attacker can directly target the staff profile upload endpoint over the network. If the upload directory allows execution of uploaded content, the attacker payload could run with the web server’s privileges, enabling remote code execution and potential data access. Limited scope of impact (C/L I/L A/L) does not preclude rapid, automated exploitation given a public PoC and unrestricted upload.

Who is most exposed

Any organisation running a web-accessible staff profile or image upload feature in a healthcare web platform—especially publicly exposed or minimally protected deployments—faces the highest risk.

Detection ideas

  • Unexpected HTTP POSTs to the upload endpoint with image parameter carrying unusual or oversized payloads.
  • Content-Type/Content-Disposition mismatches or embedded scripting payloads in image files.
  • New or modified files appearing in the upload directory, especially with executable extensions or PHP/JS code.
  • Recurrent attempts from diverse IPs indicating automated scanners.
  • WAF/IDS alerts for unrestricted upload patterns or known payload signatures.

Mitigation and prioritisation

  • Apply any available patch or upgrade to the affected version; if not, implement strict upload controls and patching waivers as a priority.
  • Restrict uploads to allowed MIME types, enforce strict size limits, and store uploads outside the web root with non-executable permissions.
  • Disable execution in the upload path and scrub file content server-side; validate and sanitise image data.
  • Enforce authentication and access controls for the upload functionality; implement CSRF protections where applicable.
  • Schedule a rapid change-management plan: test in staging, then deploy in production with monitoring.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.