Vulnerability Description
A vulnerability was found in SourceCodester Doctor's Appointment System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/appointment.php of the component GET Parameter Handler. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hshnudr | Doctors Appointment System | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/Xiaoyi-ing/CVE/issues/8ExploitIssue TrackingThird Party Advisory
- https://vuldb.com/?ctiid.309273Permissions RequiredVDB Entry
- https://vuldb.com/?id.309273Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.574129Third Party AdvisoryVDB Entry
- https://www.sourcecodester.com/Product
- https://github.com/Xiaoyi-ing/CVE/issues/8ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2025-4816?
CVE-2025-4816 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in SourceCodester Doctor's Appointment System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/appointment.php of the component GET Pa...
How severe is CVE-2025-4816?
CVE-2025-4816 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-4816?
Check the references section above for vendor advisories and patch information. Affected products include: Hshnudr Doctors Appointment System.