{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata. Fed continuously.","feed_url":"https://feed.craftedsignal.io/vendors/projectworlds/feed.json","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cpes":[],"_cs_cves":[{"cvss":7.3,"id":"CVE-2026-8785"}],"_cs_exploited":false,"_cs_has_poc":false,"_cs_poc_references":[],"_cs_products":["hospital-management-system-in-php 1.0"],"_cs_severities":["high"],"_cs_tags":["cve","sql-injection","webapp"],"_cs_type":"advisory","_cs_vendors":["projectworlds"],"content_html":"\u003cp\u003eA SQL injection vulnerability, identified as CVE-2026-8785, has been discovered in projectworlds hospital-management-system-in-php version 1.0. The vulnerability resides within the \u003ccode\u003egetAllPatientDetail\u003c/code\u003e function in the \u003ccode\u003eupdate_info.php\u003c/code\u003e file. A remote attacker can exploit this flaw by manipulating the \u003ccode\u003eappointment_no\u003c/code\u003e GET parameter. The vendor has been notified, but has not yet responded or provided a patch. Publicly available exploits exist, making this vulnerability a significant risk.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker identifies an instance of projectworlds hospital-management-system-in-php version 1.0.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious HTTP GET request targeting the \u003ccode\u003eupdate_info.php\u003c/code\u003e file.\u003c/li\u003e\n\u003cli\u003eThe attacker injects SQL code into the \u003ccode\u003eappointment_no\u003c/code\u003e parameter of the GET request.\u003c/li\u003e\n\u003cli\u003eThe webserver processes the request and passes the \u003ccode\u003eappointment_no\u003c/code\u003e parameter to the \u003ccode\u003egetAllPatientDetail\u003c/code\u003e function without proper sanitization.\u003c/li\u003e\n\u003cli\u003eThe injected SQL code is executed against the database.\u003c/li\u003e\n\u003cli\u003eThe attacker retrieves sensitive data from the database, such as patient records or credentials.\u003c/li\u003e\n\u003cli\u003eThe attacker may modify or delete data within the database.\u003c/li\u003e\n\u003cli\u003eThe attacker may use the compromised database to further compromise the system or other connected systems.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows an attacker to execute arbitrary SQL commands. This can lead to the disclosure of sensitive patient data, modification or deletion of records, and potential compromise of the entire application and underlying database server. Given the nature of the application, this could result in severe breaches of patient privacy, financial losses, and reputational damage for the affected healthcare organization.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eInspect web server logs for suspicious GET requests to \u003ccode\u003eupdate_info.php\u003c/code\u003e containing SQL syntax in the \u003ccode\u003eappointment_no\u003c/code\u003e parameter and deploy the \u0026ldquo;Detect CVE-2026-8785 Exploitation via SQL Injection\u0026rdquo; Sigma rule.\u003c/li\u003e\n\u003cli\u003eApply input validation and sanitization to the \u003ccode\u003eappointment_no\u003c/code\u003e parameter in the \u003ccode\u003egetAllPatientDetail\u003c/code\u003e function to prevent SQL injection. Contact the vendor for a patch or apply a hotfix.\u003c/li\u003e\n\u003cli\u003eMonitor database logs for unauthorized access or modification attempts originating from the web server.\u003c/li\u003e\n\u003cli\u003eImplement the \u0026ldquo;Detect SQL Injection Characters in HTTP GET Parameters\u0026rdquo; Sigma rule to broadly detect potential SQL injection attempts.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-18T04:17:20Z","date_published":"2026-05-18T04:17:20Z","id":"https://feed.craftedsignal.io/briefs/2026-05-hospital-management-sql-injection/","summary":"A SQL injection vulnerability (CVE-2026-8785) exists in the getAllPatientDetail function of the update_info.php file in projectworlds hospital-management-system-in-php version 1.0, allowing remote attackers to execute arbitrary SQL commands via the 'appointment_no' GET parameter.","title":"SQL Injection Vulnerability in projectworlds hospital-management-system-in-php 1.0 (CVE-2026-8785)","url":"https://feed.craftedsignal.io/briefs/2026-05-hospital-management-sql-injection/"}],"language":"en","title":"CraftedSignal Threat Feed — Projectworlds","version":"https://jsonfeed.org/version/1.1"}