CVE-2026-3170
Plain English Summary
AI-powered analysis for quick understanding
An attacker can inject malicious scripts into the Patients Waiting Area Queue Management System by manipulating the First Name or Last Name fields in the patient search function, allowing them to execute harmful actions on users' browsers. This vulnerability can be exploited remotely, meaning attackers don't need physical access to the system to carry out their attack.
Technical Description
A vulnerability was detected in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected is an unknown function of the file /patient-search.php. The manipulation of the argument First Name/Last Name results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 25, 2026
about 1 month ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
pamzey
Product
patients waiting area queue management system
Related Vulnerabilities
An attacker can gain unauthorized access to sensitive patient information by exploiting a flaw in the queue management system's patient search feature, which can be done remotely. This vulnerability requires no special access or credentials, making it easier for malicious users to take advantage of it.
An attacker can remotely manipulate the patient ID in the queue management system to gain unauthorized access to sensitive functions, potentially allowing them to view or alter patient information. This vulnerability can be exploited without needing any special access or credentials.
This vulnerability allows an attacker to inject malicious scripts into the queue management system, which could then be executed in the browsers of users visiting the site. The attacker can exploit this remotely by manipulating the names entered in the system, making it a risk for anyone using the application.