| Título | SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting |
|---|
| Descripción | A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. The vulnerability is located in the 'Find Patient' module (/pqms/patient-search.php).
The flaw occurs because the application fails to sanitize patient registration data (specifically the First Name and Last Name fields) before storing it in the database and subsequently rendering it in the search results. A remote attacker can register a patient with a malicious payload, such as "><img src=x onerror=alert(1)>. When an authenticated staff member or administrator searches for patients at /pqms/patient-search.php, the payload is retrieved from the database and executed in their browser context. This could lead to session hijacking, unauthorized data access, or administrative account takeover. |
|---|
| Fuente | ⚠️ https://gist.github.com/archana1122m/e2953222b47c29c8c69855f5d623267d |
|---|
| Usuario | Archana M (UID 95668) |
|---|
| Sumisión | 2026-02-17 21:25 (hace 2 meses) |
|---|
| Moderación | 2026-02-24 23:01 (7 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 347677 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /patient-search.php First Name/Last Name secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|