Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3170: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System

0
Medium
VulnerabilityCVE-2026-3170cvecve-2026-3170
Published: Wed Feb 25 2026 (02/25/2026, 08:02:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Patients Waiting Area Queue Management System

Description

CVE-2026-3170 is a medium severity cross-site scripting (XSS) vulnerability found in SourceCodester Patients Waiting Area Queue Management System version 1. 0. The vulnerability exists in the /patient-search. php file where the First Name and Last Name input parameters are improperly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction to trigger the payload. Although no known exploits are currently active in the wild, the exploit code has been publicly disclosed, increasing the risk of attack. This vulnerability can lead to theft of user session data, defacement, or redirection to malicious sites, impacting confidentiality and integrity. Organizations using this system in healthcare or patient management contexts should prioritize remediation. The medium CVSS score of 4. 8 reflects the moderate impact and ease of exploitation without privileges.

AI-Powered Analysis

AILast updated: 02/25/2026, 08:25:47 UTC

Technical Analysis

CVE-2026-3170 is a cross-site scripting vulnerability identified in version 1.0 of the SourceCodester Patients Waiting Area Queue Management System, specifically within the /patient-search.php script. The vulnerability arises due to insufficient sanitization of user-supplied input in the First Name and Last Name parameters, which are reflected in the web application without proper encoding or validation. This flaw allows remote attackers to inject arbitrary JavaScript code that executes in the context of the victim's browser when they interact with the affected page. The attack vector is network accessible (AV:N), requires no authentication (AT:N), but does require user interaction (UI:P) to trigger the malicious script. The vulnerability impacts the confidentiality and integrity of user data by enabling session hijacking, credential theft, or manipulation of displayed content. The CVSS 4.8 score indicates a medium severity level, considering the ease of exploitation and the limited scope of impact. No patches or vendor advisories are currently available, and no active exploits have been reported in the wild, though public exploit code exists. The vulnerability is particularly concerning for healthcare environments where patient data confidentiality is critical. Remediation requires implementing proper input validation, output encoding, and monitoring for suspicious activity.

Potential Impact

The primary impact of CVE-2026-3170 is the potential compromise of user confidentiality and integrity within healthcare queue management systems. Successful exploitation can lead to session hijacking, theft of sensitive patient or user information, and unauthorized actions performed on behalf of legitimate users. This can undermine trust in healthcare providers and potentially violate data protection regulations such as HIPAA or GDPR. While availability is not directly affected, the reputational damage and potential regulatory penalties can be significant. The vulnerability's remote exploitability without authentication increases the attack surface, especially in environments where the system is accessible over the internet or internal networks with many users. Organizations relying on this software for patient management may face targeted attacks aiming to disrupt operations or harvest sensitive data. The medium severity score reflects a moderate but non-negligible risk, emphasizing the need for timely mitigation to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2026-3170, organizations should implement strict input validation on the First Name and Last Name fields to ensure that no executable scripts or malicious payloads can be submitted. Employ context-aware output encoding (e.g., HTML entity encoding) before rendering user inputs in the browser to prevent script execution. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor web application logs for unusual input patterns or repeated attempts to inject scripts. If possible, isolate the affected system behind a web application firewall (WAF) configured to detect and block XSS payloads. Engage with the vendor or SourceCodester community to obtain or request official patches or updates addressing this vulnerability. Additionally, educate users about the risks of interacting with suspicious links or inputs. Regularly review and update the software to the latest secure versions and conduct security assessments to identify similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-24T22:01:27.082Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699eaeb3b7ef31ef0be98664

Added to database: 2/25/2026, 8:11:31 AM

Last enriched: 2/25/2026, 8:25:47 AM

Last updated: 2/25/2026, 10:51:56 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats