2026-04-29 8:17CVE-2026-42514CERT-In
PUBLISHED5.2CWE-319

Sensitive Data Exposure Vulnerability in e-Sushrut HMIS

This vulnerability exists in e-Sushrut due to exposure of OTPs in plaintext within API responses. A remote attacker could exploit this vulnerability by intercepting API responses containing valid OTPs.

Successful exploitation of this vulnerability could allow an attacker to impersonate the target user and gain unauthorized access to user accounts on the targeted system.

Problem type

Affected products

CDAC-Noida

e-Sushrut, Hospital Management Information System (HMIS)

Previous versions - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-42514
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-42514",
    "assignerOrgId": "66834db9-ab24-42b4-be80-296b2e40335c",
    "assignerShortName": "CERT-In",
    "dateUpdated": "2026-04-29T08:17:12.372Z",
    "dateReserved": "2026-04-28T08:14:36.620Z",
    "datePublished": "2026-04-29T08:17:12.372Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "66834db9-ab24-42b4-be80-296b2e40335c",
        "shortName": "CERT-In",
        "dateUpdated": "2026-04-29T08:17:12.372Z"
      },
      "title": "Sensitive Data Exposure Vulnerability in e-Sushrut HMIS",
      "descriptions": [
        {
          "lang": "en",
          "value": "This vulnerability exists in e-Sushrut due to exposure of OTPs in plaintext within API responses. A remote attacker could exploit this vulnerability by intercepting API responses containing valid OTPs.\n\nSuccessful exploitation of this vulnerability could allow an attacker to impersonate the target user and gain unauthorized access to user accounts on the targeted system.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "This vulnerability exists in e-Sushrut due to exposure of OTPs in plaintext within API responses. A remote attacker could exploit this vulnerability by intercepting API responses containing valid OTPs.\n<br>Successful exploitation of this vulnerability could allow an attacker to impersonate the target user and gain unauthorized access to user accounts on the targeted system.&nbsp;<br>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "CDAC-Noida",
          "product": "e-Sushrut, Hospital Management Information System (HMIS)",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "Previous versions",
              "status": "affected",
              "versionType": "custom"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-319 Cleartext transmission of sensitive information",
              "cweId": "CWE-319",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2026-0207",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-117",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-117 Interception"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Contact C-DAC for upgrading e-Sushrut HMIS to latest version",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Contact C-DAC for upgrading e-Sushrut HMIS to latest version"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "This vulnerability is reported by Harsh Verma",
          "type": "finder"
        }
      ]
    }
  }
}