This vulnerability exists in e-Sushrut due to improper access control in resource access validation. An authenticated attacker could exploit this vulnerability by manipulating parameter in the API request URL to gain unauthorized access to sensitive information of patients on the targeted system.
PUBLISHED5.2CWE-639
Insecure Direct Object Reference (IDOR) Vulnerability in e-Sushrut HMIS
Problem type
Affected products
CDAC-Noida
e-Sushrut, Hospital Management Information System (HMIS)
Previous versions - AFFECTED
References
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-42515Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-42515",
"assignerOrgId": "66834db9-ab24-42b4-be80-296b2e40335c",
"assignerShortName": "CERT-In",
"dateUpdated": "2026-04-29T08:22:57.139Z",
"dateReserved": "2026-04-28T08:14:36.620Z",
"datePublished": "2026-04-29T08:22:57.139Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "66834db9-ab24-42b4-be80-296b2e40335c",
"shortName": "CERT-In",
"dateUpdated": "2026-04-29T08:22:57.139Z"
},
"title": "Insecure Direct Object Reference (IDOR) Vulnerability in e-Sushrut HMIS",
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists in e-Sushrut due to improper access control in resource access validation. An authenticated attacker could exploit this vulnerability by manipulating parameter in the API request URL to gain unauthorized access to sensitive information of patients on the targeted system.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "This vulnerability exists in e-Sushrut due to improper access control in resource access validation. An authenticated attacker could exploit this vulnerability by manipulating parameter in the API request URL to gain unauthorized access to sensitive information of patients on the targeted system."
}
]
}
],
"affected": [
{
"vendor": "CDAC-Noida",
"product": "e-Sushrut, Hospital Management Information System (HMIS)",
"defaultStatus": "unaffected",
"versions": [
{
"version": "Previous versions",
"status": "affected",
"versionType": "custom"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-639 Authorization bypass through User-Controlled key",
"cweId": "CWE-639",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2026-0207",
"tags": [
"third-party-advisory"
]
}
],
"impacts": [
{
"capecId": "CAPEC-566",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-566 Authorization Bypass Through Parameter Manipulation"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"solutions": [
{
"lang": "en",
"value": "Contact C-DAC for upgrading e-Sushrut HMIS to latest version",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Contact C-DAC for upgrading e-Sushrut HMIS to latest version"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability is reported by Harsh Verma",
"type": "finder"
}
]
}
}
}