A vulnerability was detected in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected is an unknown function of the file /patient-search.php. The manipulation of the argument First Name/Last Name results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used.

Project Subscriptions

Vendors Products
Patients Waiting Area Queue Management System Subscribe
Patrick Mvuma Subscribe
Patients Waiting Area Queue Management System Subscribe
Sourcecodester Subscribe
Patients Waiting Area Queue Management System Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Patrick Mvuma
Patrick Mvuma patients Waiting Area Queue Management System
Sourcecodester
Sourcecodester patients Waiting Area Queue Management System
Vendors & Products Patrick Mvuma
Patrick Mvuma patients Waiting Area Queue Management System
Sourcecodester
Sourcecodester patients Waiting Area Queue Management System

Wed, 25 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Pamzey
Pamzey patients Waiting Area Queue Management System
CPEs cpe:2.3:a:pamzey:patients_waiting_area_queue_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Pamzey
Pamzey patients Waiting Area Queue Management System

Wed, 25 Feb 2026 08:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected is an unknown function of the file /patient-search.php. The manipulation of the argument First Name/Last Name results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used.
Title SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System patient-search.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T16:53:08.594Z

Reserved: 2026-02-24T22:01:27.082Z

Link: CVE-2026-3170

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T08:16:19.807

Modified: 2026-02-25T20:50:55.940

Link: CVE-2026-3170

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-26T13:18:22Z

Weaknesses