cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forkivicare-clinic-management-system kivicare-clinic-management-system

Direction: descending
Apr 19, 2026

KiviCare – Clinic & Patient Management System (EHR) # CVE-2026-0927

CVE, Research URL

CVE-2026-0927

Date
Jan 23, 2026
Research Description
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to arbitrary file uploads due to missing authorization checks in the uploadMedicalReport() function in all versions up to, and including, 3.6.15. This makes it possible for unauthenticated attackers to upload text files and PDF documents to the affected site's server which may be leveraged for further attacks such as hosting malicious content or phishing pages via PDF files.
Affected versions
max 3.6.16.
Status
vulnerable
Apr 13, 2026

KiviCare – Clinic & Patient Management System (EHR) # CVE-2026-2992

CVE, Research URL

CVE-2026-2992

Date
Mar 18, 2026
Research Description
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization on the `/wp-json/kivicare/v1/setup-wizard/clinic` REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to create a new clinic and a WordPress user with clinic admin privileges.
Affected versions
max 4.1.3.
Status
vulnerable

KiviCare – Clinic & Patient Management System (EHR) # CVE-2026-2991

CVE, Research URL

CVE-2026-2991

Date
Mar 18, 2026
Research Description
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.1.2. This is due to the `patientSocialLogin()` function not verifying the social provider access token before authenticating a user. This makes it possible for unauthenticated attackers to log in as any patient registered on the system by providing only their email address and an arbitrary value for the access token, bypassing all credential verification. The attacker gains access to sensitive medical records, appointments, prescriptions, and billing information (PII/PHI breach). Additionally, authentication cookies are set before the role check, meaning the auth cookies for non-patient users (including administrators) are also set in the HTTP response headers, even though a 403 response is returned.
Affected versions
max 4.1.3.
Status
vulnerable
Mar 30, 2026

KiviCare – Clinic & Patient Management System (EHR) # CVE-2026-25383

CVE, Research URL

CVE-2026-25383

Date
Mar 25, 2026
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Reflected XSS.This issue affects KiviCare: from n/a through <= 3.6.16.
Affected versions
max 3.6.16.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2026-25034

CVE, Research URL

CVE-2026-25034

Date
Mar 25, 2026
Research Description
Missing Authorization vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects KiviCare: from n/a through <= 3.6.16.
Affected versions
max 3.6.16.
Status
vulnerable
Feb 27, 2026

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2026-25022

CVE, Research URL

CVE-2026-25022

Date
Feb 03, 2026
Research Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Blind SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.16.
Affected versions
max 3.6.16.
Status
vulnerable
Dec 11, 2025

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2025-66095

CVE, Research URL

CVE-2025-66095

Date
Nov 21, 2025
Research Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows SQL Injection.This issue affects KiviCare: from n/a through <= 3.6.13.
Affected versions
max 3.6.13.
Status
vulnerable
Mar 01, 2025

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2025-1572

CVE, Research URL

CVE-2025-1572

Date
Feb 28, 2025
Research Description
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the ‘u_id’ parameter in all versions up to, and including, 3.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with doctor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 3.6.8.
Status
vulnerable
Dec 06, 2024

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2024-11728

CVE, Research URL

CVE-2024-11728

Date
Dec 06, 2024
Research Description
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 3.6.5.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2024-11730

CVE, Research URL

CVE-2024-11730

Date
Dec 06, 2024
Research Description
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'sort[]' parameter of the static_data_list AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with doctor/receptionist-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 3.6.5.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2024-11729

CVE, Research URL

CVE-2024-11729

Date
Dec 06, 2024
Research Description
The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'service_list[0][service_id]' parameter of the get_widget_payment_options AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Custom-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
max 3.6.5.
Status
vulnerable
Jun 07, 2024

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2023-2624

CVE, Research URL

CVE-2023-2624

Date
Jun 27, 2023
Research Description
The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator
Affected versions
max 3.2.1.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2023-2627

CVE, Research URL

CVE-2023-2627

Date
Jun 27, 2023
Research Description
The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings
Affected versions
max 3.2.1.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2024-35659

CVE, Research URL

CVE-2024-35659

Date
Jun 08, 2024
Research Description
Authorization Bypass Through User-Controlled Key vulnerability in KiviCare.This issue affects KiviCare: from n/a through 3.6.2.
Affected versions
max 3.6.7.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2022-0786

CVE, Research URL

CVE-2022-0786

Date
Jun 13, 2022
Research Description
The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users
Affected versions
max 2.3.9.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2023-2628

CVE, Research URL

CVE-2023-2628

Date
Jun 27, 2023
Research Description
The KiviCare WordPress plugin before 3.2.1 does not have CSRF checks (either flawed or missing completely) in various AJAX actions, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks. This includes, but is not limited to: Delete arbitrary appointments/medical records/etc, create/update various users (patients, doctors etc)
Affected versions
max 3.2.1.
Status
vulnerable

KiviCare &#8211; Clinic &amp; Patient Management System (EHR) # CVE-2023-2623

CVE, Research URL

CVE-2023-2623

Date
Jun 27, 2023
Research Description
The KiviCare WordPress plugin before 3.2.1 does not restrict the information returned in a response and returns all user data, allowing low privilege users such as subscriber to retrieve sensitive information such as the user email and hashed password of other users
Affected versions
max 3.2.1.
Status
vulnerable