Description
A vulnerability was determined in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. This vulnerability affects unknown code. Executing a manipulation can lead to cross-site request forgery. It is possible to launch the attack remotely.
Published: 2026-01-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery (CWE‑352)
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a cross‑site request forgery (CWE‑352) that allows a remote attacker to craft a request to the Patients Waiting Area Queue Management System to execute privileged actions without the victim's consent. The description states that executing a manipulation can lead to cross‑site request forgery and the attack can be launched remotely. This flaw risks unauthorized modification or retrieval of sensitive data, potentially compromising confidentiality, integrity, and availability of the queue system.

Affected Systems

Affected systems include the Patients Waiting Area Queue Management System released by Patrick Mvuma and SourceCodester, version 1.0. The Common Platform Enumeration indicates that the flaw resides in the 1.0 release of the application. No other versions or sub‑components are explicitly mentioned as affected.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate risk. EPSS is below 1 %, suggesting a very low yet non‑zero probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Because the attack vector is remote and the flaw involves cross‑site request forgery, an attacker would need to persuade a legitimate user or a service to submit a forged request, often by embedding malicious content in a link or submitting a form. The low EPSS score indicates that exploitation is unlikely at the moment, but the presence of CSRF makes the system vulnerable to a common and well‑known technique.

Generated by OpenCVE AI on April 18, 2026 at 05:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a fixed version of Patients Waiting Area Queue Management System.
  • Introduce synchronizer‑token (CSRF token) checks for all state‑changing requests.
  • Enforce same‑origin or referrer validation to reject cross‑origin POSTs.
  • Verify that each privileged operation is protected by proper authorization checks and role‑based access controls.

Generated by OpenCVE AI on April 18, 2026 at 05:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 30 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Pamzey
Pamzey patients Waiting Area Queue Management System
CPEs cpe:2.3:a:pamzey:patients_waiting_area_queue_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Pamzey
Pamzey patients Waiting Area Queue Management System

Tue, 20 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester patients Waiting Area Queue Management System
Vendors & Products Sourcecodester
Sourcecodester patients Waiting Area Queue Management System

Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. This vulnerability affects unknown code. Executing a manipulation can lead to cross-site request forgery. It is possible to launch the attack remotely.
Title SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System cross-site request forgery
Weaknesses CWE-352
CWE-862
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:ND/RL:ND/RC:ND'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Pamzey Patients Waiting Area Queue Management System
Sourcecodester Patients Waiting Area Queue Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:44:31.313Z

Reserved: 2026-01-18T13:50:23.362Z

Link: CVE-2026-1148

cve-icon Vulnrichment

Updated: 2026-01-20T16:32:27.315Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T10:16:08.697

Modified: 2026-01-30T18:13:43.527

Link: CVE-2026-1148

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses