提交 #759845: SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting信息

标题SourceCodester Patients Waiting Area Queue Management System 1.0 Cross Site Scripting
描述A Stored Cross-Site Scripting (XSS) vulnerability was discovered in SourceCodester Patients Waiting Area Queue Management System 1.0. The vulnerability is located in the 'Find Patient' module (/pqms/patient-search.php). The flaw occurs because the application fails to sanitize patient registration data (specifically the First Name and Last Name fields) before storing it in the database and subsequently rendering it in the search results. A remote attacker can register a patient with a malicious payload, such as "><img src=x onerror=alert(1)>. When an authenticated staff member or administrator searches for patients at /pqms/patient-search.php, the payload is retrieved from the database and executed in their browser context. This could lead to session hijacking, unauthorized data access, or administrative account takeover.
来源⚠️ https://gist.github.com/archana1122m/e2953222b47c29c8c69855f5d623267d
用户
 Archana M (UID 95668)
提交2026-02-17 21時25分 (2 月前)
管理2026-02-24 23時01分 (7 days later)
状态已接受
VulDB条目347677 [SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0 /patient-search.php First Name/Last Name 跨网站脚本]
积分20

Do you know our Splunk app?

Download it now for free!