### [CVE-2022-29938](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29938) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description In LibreHealth EHR 2.0.0, lack of sanitization of the GET parameter payment_id in interface\billing\new_payment.php via interface\billing\payment_master.inc.php leads to SQL injection. ### POC #### Reference - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r - https://nitroteam.kz/index.php?action=researches&slug=librehealth_r #### Github No PoCs found on GitHub currently.