Description
A vulnerability was found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. This affects an unknown part of the file /php/api_patient_schedule.php. Performing a manipulation of the argument Reason results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Published: 2026-01-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Client‑side Injection)
Action: Apply Patch
AI Analysis

Impact

The flaw is in Patients Waiting Area Queue Management System 1.0 and is triggered when a malicious value is supplied for the Reason parameter in the api_patient_schedule.php script. The vulnerable code reflects the parameter back to an HTML page without adequate sanitization, allowing an attacker to inject arbitrary HTML or JavaScript. The weakness is classified under common weaknesses that involve untrusted input rendering and improper command evaluation. Consequently, users who receive the page can have scripts executed in their browsers, leading to potential session hijacking, phishing, or defacement.

Affected Systems

Affected vendors include Patrick Mvuma and SourceCodester for patients waiting area queue management systems. The vulnerability exists in version 1.0 of the software. No other versions or additional details are specified in the available documentation.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity, and the exploit is remote with no authentication requirement. The EPSS score is under 1 %, signifying a low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalogue. Attackers can exploit the flaw by crafting a URL or API call that injects malicious scripts into the Reason parameter, which is then reflected in the response page.

Generated by OpenCVE AI on April 18, 2026 at 05:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a fixed version of the Patients Waiting Area Queue Management System.
  • Validate and sanitize the Reason input server‑side, ensuring that any data reflected back to the browser is properly escaped or encoded.
  • Implement or enforce a Content Security Policy that prevents execution of inline scripts and limits trusted sources to reduce the impact of any remaining script injection attempts.

Generated by OpenCVE AI on April 18, 2026 at 05:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Pamzey
Pamzey patients Waiting Area Queue Management System
CPEs cpe:2.3:a:pamzey:patients_waiting_area_queue_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Pamzey
Pamzey patients Waiting Area Queue Management System

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester patients Waiting Area Queue Management System
Vendors & Products Sourcecodester
Sourcecodester patients Waiting Area Queue Management System

Mon, 19 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. This affects an unknown part of the file /php/api_patient_schedule.php. Performing a manipulation of the argument Reason results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Title SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System api_patient_schedule.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Pamzey Patients Waiting Area Queue Management System
Sourcecodester Patients Waiting Area Queue Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:44:20.159Z

Reserved: 2026-01-18T13:50:20.307Z

Link: CVE-2026-1147

cve-icon Vulnrichment

Updated: 2026-01-20T16:36:25.278Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T10:16:08.477

Modified: 2026-01-30T18:14:36.670

Link: CVE-2026-1147

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses