| Summary | This vulnerability exists in e-Sushrut due to improper authentication logic that relies on client-side response parameters to determine authentication status. A remote attacker could exploit this vulnerability by intercepting and modifying the server response. Successful exploitation of this vulnerability could allow the attacker to bypass authentication and gain unauthorized access to user accounts on the targeted system. |
|---|---|
| Publication Date | April 29, 2026, 6:16 p.m. |
| Registration Date | April 30, 2026, 4:10 a.m. |
| Last Update | April 29, 2026, 6:16 p.m. |