提出 #759845: SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting情報

タイトルSourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting
説明A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. The vulnerability is located in the 'Find Patient' module (/pqms/patient-search.php). The flaw occurs because the application fails to sanitize patient registration data (specifically the First Name and Last Name fields) before storing it in the database and subsequently rendering it in the search results. A remote attacker can register a patient with a malicious payload, such as "><img src=x onerror=alert(1)>. When an authenticated staff member or administrator searches for patients at /pqms/patient-search.php, the payload is retrieved from the database and executed in their browser context. This could lead to session hijacking, unauthorized data access, or administrative account takeover.
ソース⚠️ https://gist.github.com/archana1122m/e2953222b47c29c8c69855f5d623267d
ユーザー
 Archana M (UID 95668)
送信2026年02月17日 21:25 (2 月 ago)
モデレーション2026年02月24日 23:01 (7 days later)
ステータス承諾済み
VulDBエントリ347677 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /patient-search.php First Name/Last Name クロスサイトスクリプティング]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!