Description
A weakness has been identified in SourceCodester Patients Waiting Area Queue Management System 1.0. The impacted element is the function ValidateToken of the file /php/api_patient_checkin.php of the component Patient Check-In Module. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Patient Check-In Functionality
Action: Patch Deploy
AI Analysis

Impact

The vulnerability lies in the ValidateToken function within the Patient Check‑In Module. By manipulating the API request, an attacker can bypass the intended token validation and perform actions without proper authorization. This improper authorization can allow unauthorized creation, modification, or viewing of patient records, leading to confidentiality and integrity breaches.

Affected Systems

SourceCodester Patients Waiting Area Queue Management System, version 1.0.

Risk and Exploitability

The issue has a CVSS score of 6.9, indicating moderate criticality. Exploitation is feasible over the network, and the attack code is publicly available, increasing the likelihood of real‑world attacks even though EPSS data is not provided and the vulnerability is not listed in KEV. Attackers can send specially crafted requests to the /php/api_patient_checkin.php endpoint, exploiting the missing authorization checks to gain unauthorized access to patient data.

Generated by OpenCVE AI on March 24, 2026 at 03:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the software to the latest version released by SourceCodester that addresses the token validation flaw.
  • If a patch is unavailable, restrict direct access to the /php/api_patient_checkin.php endpoint using firewall rules or network segmentation.
  • Enforce strict authentication and authorization on the API, such as requiring a secure session token and checking user roles before processing requests.
  • Monitor logs for unusual API activity and investigate any unauthorized attempts to use the patient check‑in functionality.

Generated by OpenCVE AI on March 24, 2026 at 03:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester patients Waiting Area Queue Management System
Vendors & Products Sourcecodester
Sourcecodester patients Waiting Area Queue Management System

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in SourceCodester Patients Waiting Area Queue Management System 1.0. The impacted element is the function ValidateToken of the file /php/api_patient_checkin.php of the component Patient Check-In Module. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title SourceCodester Patients Waiting Area Queue Management System Patient Check-In api_patient_checkin.php ValidateToken improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Patients Waiting Area Queue Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T13:34:46.349Z

Reserved: 2026-03-23T05:57:53.947Z

Link: CVE-2026-4617

cve-icon Vulnrichment

Updated: 2026-03-24T13:34:40.100Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T01:17:02.587

Modified: 2026-03-24T15:53:48.067

Link: CVE-2026-4617

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:33Z

Weaknesses