Chikitsa Patient Management System 2.0.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious PHP plugins through the module upload functionality. Authenticated attackers can generate and upload a ZIP plugin with a PHP backdoor that enables arbitrary command execution on the server through a weaponized PHP script.
References
| Link | Resource |
|---|---|
| https://github.com/sanskruti-technologies/chikitsa | Product |
| https://sourceforge.net/projects/chikitsa/ | Product |
| https://www.chikitsa.io/ | Product |
| https://www.exploit-db.com/exploits/50571 | Exploit VDB Entry |
Configurations
History
03 Feb 2026, 17:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/sanskruti-technologies/chikitsa - Product | |
| References | () https://sourceforge.net/projects/chikitsa/ - Product | |
| References | () https://www.chikitsa.io/ - Product | |
| References | () https://www.exploit-db.com/exploits/50571 - Exploit, VDB Entry | |
| CPE | cpe:2.3:a:chikitsa:patient_management_system:2.0.2:*:*:*:*:*:*:* | |
| First Time |
Chikitsa patient Management System
Chikitsa |
Information
Published : 2026-01-15 16:16
Updated : 2026-02-03 17:53
NVD link : CVE-2021-47758
Mitre link : CVE-2021-47758
CVE.ORG link : CVE-2021-47758
JSON object : View
Products Affected
chikitsa
- patient_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
