Cyber Posture

CVE-2026-1550

MediumPublic PoC

Published: 28 January 2026

Published
28 January 2026
Modified
09 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0002 5.5th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1550 is a medium-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Phpgurukul Hospital Management System. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-285 CWE-266

Documented procedures facilitate correct implementation and ongoing management of authorization decisions.

addresses: CWE-285 CWE-266

Periodic reviews identify and correct flaws in authorization decisions or enforcement.

addresses: CWE-285 CWE-266

Specifying access authorizations for each account and requiring approvals for account requests enforces proper authorization decisions.

addresses: CWE-266 CWE-285

The control requires explicit definition of separated access authorizations, making incorrect privilege assignments that bundle conflicting duties harder to implement.

addresses: CWE-266 CWE-285

Ensures privileges are assigned only as necessary rather than incorrectly over-granted.

addresses: CWE-285

The control's documentation requirement reduces improper authorization by ensuring only mission-justified actions bypass authentication.

addresses: CWE-285

Establishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.

addresses: CWE-285

Explicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Improper authorization (CWE-285/266) in a web app admin component directly enables remote exploitation of a public-facing application (T1190) and abuse for unauthorized privilege escalation (T1068) from low-privileged accounts.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A security flaw has been discovered in PHPGurukul Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file /hms/hospital/docappsystem/adminviews.py of the component Admin Dashboard Page. Performing a manipulation results in improper authorization. Remote exploitation of…

more

the attack is possible. The exploit has been released to the public and may be used for attacks.

Deeper analysisAI

CVE-2026-1550 is an improper authorization vulnerability (CWE-266, CWE-285) in PHPGurukul Hospital Management System 1.0. The issue affects an unknown functionality in the file /hms/hospital/docappsystem/adminviews.py within the Admin Dashboard Page component. It has a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and was published on 2026-01-28.

Remote attackers with low privileges, such as authenticated users, can exploit this vulnerability by manipulating the affected component to bypass authorization controls. Successful exploitation enables limited impacts, including low-level disclosure of confidential information, modification of data, and denial of service affecting availability.

References include a GitHub repository at https://github.com/rsecroot/Hospital-Management-System/blob/main/Broken%20Access%20Control.md detailing the broken access control issue, the vendor site at https://phpgurukul.com/, and VulDB entries at https://vuldb.com/?ctiid.343246, https://vuldb.com/?id.343246, and https://vuldb.com/?submit.739837. These sources do not specify patches or mitigations in the available details.

The exploit has been publicly released, enabling potential real-world attacks against exposed deployments of this system.

Details

CWE(s)

Affected Products

phpgurukul
hospital management system
1.0

CVEs Like This One

CVE-2025-70064Same product: Phpgurukul Hospital Management System
CVE-2026-2134Same product: Phpgurukul Hospital Management System
CVE-2026-2179Same product: Phpgurukul Hospital Management System
CVE-2025-7176Same product: Phpgurukul Hospital Management System
CVE-2026-1141Same vendor: Phpgurukul
CVE-2025-25354Same vendor: Phpgurukul
CVE-2025-25352Same vendor: Phpgurukul
CVE-2025-7521Same vendor: Phpgurukul
CVE-2025-2088Same vendor: Phpgurukul
CVE-2025-2679Same vendor: Phpgurukul

References