Cyber Posture

CVE-2025-11609

LowPublic PoC

Published: 11 October 2025

Published
11 October 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0019 40.9th percentile
Risk Priority 8 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may forge web cookies that can be used to gain access to web applications or Internet services.

Security Summary

CVE-2025-11609 is a vulnerability in code-projects Hospital Management System 1.0, specifically affecting the session function within the express-session component. The flaw arises from the use of a hard-coded cryptographic key, triggered by manipulation of the "secret" argument with the input "secret". This issue, linked to CWEs-320 (Missing Cryptographic Key Management) and CWE-321 (Use of Hard-coded Cryptographic Key), was published on 2025-10-11 and carries a CVSS v3.1 base score of 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N), indicating low severity with network accessibility but high attack complexity.

Remote attackers without privileges can exploit this vulnerability over the network, though it requires high complexity and is considered difficult to execute. Successful exploitation enables limited integrity impacts, such as potential session manipulation due to the hard-coded key, without affecting confidentiality or availability.

Advisories and details are documented on sites including VULDB (ctiid.327932, id.327932, submit.672589), a GitHub repository on CVE discovery for the Hospital Management System, and the original code-projects.org page. The exploit has been publicly released and may be usable, though no specific patches or mitigations are detailed in the available information.

In notable context, the exploit's publication increases the risk for unpatched instances of this system, particularly in healthcare environments relying on the affected version.

Details

CWE(s)
CWE-320CWE-321

Affected Products

fabian
hospital management system
1.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1600.001 Reduce Key Space Defense Impairment
Adversaries may reduce the level of effort required to decrypt data transmitted over the network by reducing the cipher strength of encrypted communications.
T1606.001 Web Cookies Credential Access
Adversaries may forge web cookies that can be used to gain access to web applications or Internet services.
Why these techniques?

The hardcoded session secret enables exploitation of a public-facing web application (T1190), weakens encryption by reducing key space (T1600.001), and facilitates forging web session cookies for impersonation (T1606.001).

References