| Название | SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting |
|---|
| Описание | A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. This vulnerability specifically impacts the public-facing queue monitor located at /pqms/queue.php.
The flaw exists because the application retrieves unsanitized patient names from the database and renders them directly onto the public queue board. An attacker can register a patient with a malicious JavaScript payload (e.g., "><img src=x onerror=alert(1)>). Because the queue.php page is designed to refresh and display entries automatically, the script executes in the browser of anyone viewing the public monitor. This represents a critical security risk as it allows for persistent script execution on public-facing kiosks and can be used to deface the display or capture administrative sessions if viewed by authorized staff. |
|---|
| Источник | ⚠️ https://gist.github.com/archana1122m/2aed32e2a7ca5a648105bfdffd72a955 |
|---|
| Пользователь | Archana M (UID 95668) |
|---|
| Представление | 18.02.2026 09:40 (2 месяцы назад) |
|---|
| Модерация | 24.02.2026 23:02 (7 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 347678 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /queue.php firstname/lastname межсайтовый скриптинг] |
|---|
| Баллы | 20 |
|---|