Doctormms v1.0 was discovered to contain a SQL injection vulnerability via the $userid parameter at myAppoinment.php. NOTE: this is disputed by a third party who claims that the userid is a session variable controlled by the server, and thus cannot be used for exploitation. The original reporter counterclaims that this originates from $_SESSION["userid"]=$_POST["userid"] at line 68 in doctors\doctorlogin.php, where userid under POST is not a session variable controlled by the server.
History

Fri, 27 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2023-08-15T00:00:00.000Z

Updated: 2024-08-02T18:18:10.003Z

Reserved: 2023-08-07T00:00:00.000Z

Link: CVE-2023-39852

cve-icon Vulnrichment

Updated: 2024-08-02T18:18:10.003Z

cve-icon NVD

Status : Modified

Published: 2023-08-15T21:15:09.907

Modified: 2024-11-21T08:15:59.963

Link: CVE-2023-39852

cve-icon Redhat

No data.