Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2149: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System

0
Medium
VulnerabilityCVE-2026-2149cvecve-2026-2149
Published: Sun Feb 08 2026 (02/08/2026, 11:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Patients Waiting Area Queue Management System

Description

A vulnerability was detected in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /appointments.php. The manipulation of the argument patient_id results in cross site scripting. It is possible to launch the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:35:47 UTC

Technical Analysis

CVE-2026-2149 identifies a cross-site scripting (XSS) vulnerability in the Patients Waiting Area Queue Management System version 1.0 developed by SourceCodester. The vulnerability is located in the /appointments.php script, specifically in the handling of the patient_id parameter. Due to insufficient input validation or output encoding, an attacker can inject malicious JavaScript code remotely by manipulating this parameter. The vulnerability does not require authentication or privileges and can be exploited over the network, though it requires user interaction to trigger the malicious script execution in the victim’s browser. The CVSS 4.0 score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and causing limited integrity impact. The vulnerability can be leveraged to perform session hijacking, steal cookies, redirect users to malicious sites, or perform actions on behalf of the user, compromising confidentiality and integrity of sensitive patient or system data. Although no public patches have been released yet and no known exploits are reported in the wild, the availability of exploit code increases the urgency for mitigation. This vulnerability affects only version 1.0 of the product, which is used in healthcare environments to manage patient queues and appointments, making it a critical component for operational continuity and data privacy in healthcare settings.

Potential Impact

The impact of CVE-2026-2149 on organizations worldwide primarily concerns the confidentiality and integrity of patient data and user sessions within healthcare queue management systems. Successful exploitation can lead to theft of session cookies, enabling attackers to impersonate legitimate users, potentially accessing sensitive patient information or manipulating appointment data. This can result in privacy violations, regulatory non-compliance (e.g., HIPAA in the US, GDPR in Europe), and reputational damage. Additionally, attackers could use the vulnerability to deliver further malware or phishing attacks by redirecting users to malicious sites. Although availability impact is minimal, disruption to patient management workflows could occur if users lose trust or if administrators disable affected functionalities. Healthcare providers and associated third parties relying on this system may face operational challenges and increased risk of data breaches. The public availability of exploit code increases the likelihood of opportunistic attacks, especially in environments lacking robust input validation or security controls.

Mitigation Recommendations

To mitigate CVE-2026-2149, organizations should implement the following specific measures: 1) Apply strict input validation and output encoding on the patient_id parameter in /appointments.php to neutralize malicious scripts. Use established libraries or frameworks that automatically handle XSS prevention. 2) Deploy a Content Security Policy (CSP) to restrict execution of unauthorized scripts in browsers interacting with the system. 3) Conduct a thorough code review of the entire application to identify and remediate other potential XSS vectors. 4) Educate users and administrators about the risks of clicking on suspicious links or inputs that could trigger XSS payloads. 5) Monitor web application logs for unusual input patterns or repeated attempts to exploit the patient_id parameter. 6) If possible, isolate the queue management system behind web application firewalls (WAFs) configured to detect and block XSS attacks. 7) Engage with the vendor or community to obtain patches or updates addressing this vulnerability. 8) Consider implementing multi-factor authentication and session management best practices to reduce the impact of session hijacking if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T07:54:03.355Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988707f4b57a58fa1799fab

Added to database: 2/8/2026, 11:16:15 AM

Last enriched: 2/23/2026, 9:35:47 PM

Last updated: 3/26/2026, 2:53:39 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses