Description
A flaw has been found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected by this issue is some unknown functionality of the file /checkin.php. This manipulation of the argument patient_id causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used.
Problem types
Product status
Timeline
| 2026-02-07: | Advisory disclosed |
| 2026-02-07: | VulDB entry created |
| 2026-02-11: | VulDB entry last update |
Credits
webray.com.cn (VulDB User)
References
vuldb.com/?id.344852 (VDB-344852 | SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System checkin.php cross site scripting)
vuldb.com/?ctiid.344852 (VDB-344852 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.747921 (Submit #747921 | Patrick Mvuma Patients Waiting Area Queue Management System 1.0 Doubled Character XSS Manipulations)
github.com/...rea-Queue-Management-System-checkin-php-XSS.md