Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1146: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System

0
Medium
VulnerabilityCVE-2026-1146cvecve-2026-1146
Published: Mon Jan 19 2026 (01/19/2026, 08:32:05 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Patients Waiting Area Queue Management System

Description

CVE-2026-1146 is a medium-severity cross-site scripting (XSS) vulnerability affecting version 1. 0 of the SourceCodester Patients Waiting Area Queue Management System. The vulnerability exists in the /php/api_register_patient. php file, where the firstName and lastName parameters are not properly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires low privileges but does require user interaction, such as a victim viewing a crafted page or input. While no known exploits are currently active in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. This XSS flaw could lead to session hijacking, credential theft, or defacement, impacting confidentiality and integrity of patient data. European healthcare organizations using this system are particularly at risk due to the sensitive nature of the data and regulatory requirements. Mitigation involves implementing proper input validation and output encoding on the affected parameters, as well as applying any vendor patches if released. Countries with significant healthcare IT deployments using SourceCodester products, or with high regulatory scrutiny on patient data, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/26/2026, 20:09:07 UTC

Technical Analysis

CVE-2026-1146 identifies a cross-site scripting vulnerability in the Patients Waiting Area Queue Management System version 1.0 developed by SourceCodester. The vulnerability is located in the /php/api_register_patient.php endpoint, specifically in the handling of the firstName and lastName parameters. These parameters are susceptible to injection of malicious scripts due to insufficient input sanitization and output encoding. An attacker can exploit this remotely by crafting malicious input that, when processed and rendered by the application, executes arbitrary JavaScript in the context of the victim's browser. This can lead to various attack scenarios including session hijacking, theft of authentication tokens, or manipulation of displayed content. The vulnerability requires low privileges (PR:L) but does not require authentication (AT:N) and user interaction is necessary (UI:P), such as a user clicking a malicious link or viewing a compromised page. The CVSS 4.0 vector indicates no impact on confidentiality (VC:N), limited impact on integrity (VI:L), and no impact on availability (VA:N). The vulnerability has been publicly disclosed but no known exploits are currently reported in the wild. The lack of vendor patches at the time of disclosure means organizations must implement manual mitigations or monitor for updates. Given the nature of the system—managing patient queues and potentially sensitive patient information—the exploitation of this vulnerability could undermine trust and violate data protection regulations.

Potential Impact

For European organizations, particularly those in the healthcare sector, this vulnerability poses a risk to patient data confidentiality and integrity. Exploitation could allow attackers to steal session cookies or credentials, leading to unauthorized access to patient information or administrative functions. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential disruption of healthcare services. Since the system manages patient queues, manipulation could also affect operational availability indirectly by causing confusion or denial of service through malicious script execution. The medium severity rating reflects the moderate impact and ease of exploitation, but the sensitive context of healthcare data elevates the importance of timely mitigation. European healthcare providers using this system or similar SourceCodester products should be vigilant, as attackers may target such systems to gain footholds or exfiltrate protected health information.

Mitigation Recommendations

Organizations should immediately review and sanitize all user inputs, especially the firstName and lastName parameters in the /php/api_register_patient.php endpoint, using strict whitelist validation and context-appropriate output encoding to prevent script injection. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks. Monitor web application logs for suspicious input patterns indicative of exploitation attempts. If available, apply vendor patches promptly once released. Conduct security testing, including automated and manual penetration tests, focusing on input validation and XSS vectors. Educate users and administrators about the risks of clicking unknown links or interacting with untrusted content. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block XSS payloads targeting this application. Regularly update and patch all components of the healthcare IT environment to reduce exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T13:50:12.547Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696df1ced302b072d99017b9

Added to database: 1/19/2026, 8:56:46 AM

Last enriched: 1/26/2026, 8:09:07 PM

Last updated: 2/7/2026, 9:58:30 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats