Description
Queue Management System 4.0.0 contains a stored cross-site scripting vulnerability that allows authenticated administrators to inject malicious scripts through user creation fields. Attackers can insert JavaScript payloads in the First Name, Last Name, and Email fields during user creation, which execute when viewing the User List page.
Published: 2026-05-16
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw that lets an authenticated administrator insert arbitrary JavaScript code into the First Name, Last Name, and Email fields when adding a user. When an attacker creates such a user, the malicious script is persisted and later executed by anyone who opens the User List page, allowing actions such as phishing, cookie theft, or session hijacking that can compromise the confidentiality and integrity of other users' sessions.

Affected Systems

The affected product is Codekernel Queue Management System, version 4.0.0. The flaw resides in the user creation interface of this version.

Risk and Exploitability

The CVSS score of 5.1 reflects a moderate severity vulnerability that requires valid administrator credentials to exploit. Because the attacker must be an authenticated user with administrative privileges, the attack surface is restricted compared to an unauthenticated flaw. The EPSS score is not available, and the vulnerability is not listed in CISA KEV catalogs, suggesting no widespread exploitation has been documented. Nonetheless, the ability to inject scripts into a commonly viewed administrative page warrants timely remediation.

Generated by OpenCVE AI on May 16, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Queue Management System to a version that removes the stored XSS flaw or apply an official vendor patch if available
  • Restrict administrative access to the minimum necessary roles and enforce strong, unique passwords for administrator accounts
  • Implement input validation and output encoding on the user creation fields to neutralize any injected scripts

Generated by OpenCVE AI on May 16, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 16 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description Queue Management System 4.0.0 contains a stored cross-site scripting vulnerability that allows authenticated administrators to inject malicious scripts through user creation fields. Attackers can insert JavaScript payloads in the First Name, Last Name, and Email fields during user creation, which execute when viewing the User List page.
Title Queue Management System 4.0.0 Stored XSS via Add User
First Time appeared Pamzey
Pamzey patients Waiting Area Queue Management System
Weaknesses CWE-79
CPEs cpe:2.3:a:pamzey:patients_waiting_area_queue_management_system:4.0.0:*:*:*:*:*:*:*
Vendors & Products Pamzey
Pamzey patients Waiting Area Queue Management System
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Pamzey Patients Waiting Area Queue Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-16T15:25:56.432Z

Reserved: 2026-05-15T14:56:34.181Z

Link: CVE-2020-37240

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-16T16:16:20.223

Modified: 2026-05-16T16:16:20.223

Link: CVE-2020-37240

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-16T16:30:27Z

Weaknesses