Cyber Posture

CVE-2025-70064

HighPublic PoC

Published: 18 February 2026

Published
18 February 2026
Modified
23 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing to the /admin/ directory after authentication. This allows any…

more

self-registered user to takeover the application, view confidential logs, and modify system data.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for logical access, directly preventing low-privileged patients from accessing the /admin/ directory and sub-modules.

prevent

Implements least privilege to ensure patient accounts cannot access or takeover administrative functions.

prevent

Requires determination and authorization of access to resources like the admin dashboard prior to granting, addressing improper access control decisions.

Security SummaryAI

CVE-2025-70064 is a privilege escalation vulnerability in PHPGurukul Hospital Management System version 4.0. It allows a low-privileged user, such as a patient, to directly access the Administrator Dashboard and all associated sub-modules, including User Logs and Doctor Management, by manually navigating to the /admin/ directory after authentication. The issue stems from improper access controls, mapped to CWE-284 (Improper Access Control), and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

The vulnerability can be exploited by any authenticated low-privileged user, such as a self-registered patient, requiring no advanced skills beyond basic web navigation. Successful exploitation grants full administrative control over the application, enabling attackers to take over the system, view confidential user logs, and modify critical data like doctor information or other hospital records.

Advisories detailing the vulnerability are available at https://gist.github.com/Sanka1pp/c6f20cd6db1fbb1f0e7e199ead66691d and https://packetstorm.news/files/id/213711, published on 2026-02-18. These references provide proof-of-concept details but do not specify patches or mitigations in the available description.

Details

CWE(s)

Affected Products

phpgurukul
hospital management system
4.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CVE enables exploitation of public-facing web application (T1190) resulting in privilege escalation (T1068) through improper access controls allowing low-privileged users to access admin dashboard.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References