Home

Description

Queue Management System 4.0.0 contains a stored cross-site scripting vulnerability that allows authenticated administrators to inject malicious scripts through user creation fields. Attackers can insert JavaScript payloads in the First Name, Last Name, and Email fields during user creation, which execute when viewing the User List page.

PUBLISHED Reserved 2026-05-15 | Published 2026-05-16 | Updated 2026-05-18 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

4.0.0
affected

Credits

Kislay Kumar finder

References

www.exploit-db.com/exploits/49296 (ExploitDB-49296) exploit

codekernel.net/ (Official Product Homepage) product

codecanyon.net/item/queue-management-system/22029961 (Product Reference) product

www.vulncheck.com/...nagement-system-stored-xss-via-add-user (VulnCheck Advisory: Queue Management System 4.0.0 Stored XSS via Add User) third-party-advisory

cve.org (CVE-2020-37240)

nvd.nist.gov (CVE-2020-37240)

Download JSON