Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3302: Cross Site Scripting in SourceCodester Doctor Appointment System

0
Medium
VulnerabilityCVE-2026-3302cvecve-2026-3302
Published: Fri Feb 27 2026 (02/27/2026, 06:02:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Doctor Appointment System

Description

CVE-2026-3302 is a medium-severity cross-site scripting (XSS) vulnerability in SourceCodester Doctor Appointment System version 1. 0. The flaw exists in the /register. php file on the Sign Up Page, where the Email parameter is not properly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction, such as a victim clicking a crafted link or submitting manipulated input. While no known exploits are currently active in the wild, proof-of-concept code has been publicly disclosed. This vulnerability can lead to theft of user credentials, session hijacking, or defacement of the web application. Organizations using this system should prioritize input validation and output encoding on the affected parameter to mitigate risk. The threat primarily affects healthcare providers and related organizations using this specific appointment system, with notable risk in countries where this software is deployed. The CVSS 4.

AI-Powered Analysis

AILast updated: 02/27/2026, 06:42:05 UTC

Technical Analysis

CVE-2026-3302 identifies a cross-site scripting vulnerability in SourceCodester Doctor Appointment System version 1.0, specifically within the /register.php script handling the Sign Up Page. The vulnerability arises from improper input validation and sanitization of the Email parameter, which allows an attacker to inject arbitrary JavaScript code. When a victim interacts with a maliciously crafted input—such as clicking a link or submitting a form containing the injected script—the attacker’s code executes in the victim’s browser context. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is remotely exploitable without requiring authentication, increasing its risk profile. Although no active exploits have been reported in the wild, the availability of proof-of-concept code lowers the barrier for attackers to develop functional exploits. The vulnerability does not affect the availability of the system but compromises confidentiality and integrity to some extent. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for the attacker, but user interaction is needed for the victim, and limited impact on integrity. The absence of patches or vendor advisories at this time necessitates immediate mitigation through input validation and output encoding best practices.

Potential Impact

The primary impact of CVE-2026-3302 is on the confidentiality and integrity of user data within the affected Doctor Appointment System. Successful exploitation can allow attackers to execute arbitrary scripts in the context of the victim’s browser, potentially leading to theft of session cookies, personal information, or credentials. This can facilitate further attacks such as account takeover or unauthorized access to sensitive patient data. While the vulnerability does not directly affect system availability, the resulting compromise can damage organizational reputation, violate patient privacy regulations, and lead to compliance penalties. Healthcare organizations relying on this system may face increased risk of targeted phishing or social engineering attacks leveraging the XSS vulnerability. The remote exploitability and lack of required privileges make this a viable vector for attackers seeking to compromise user trust and data integrity in medical appointment environments.

Mitigation Recommendations

To mitigate CVE-2026-3302, organizations should implement strict input validation on the Email parameter within /register.php, ensuring that only properly formatted email addresses are accepted. Employing server-side validation in addition to client-side checks is critical. Output encoding or escaping should be applied to all user-supplied data before rendering it in HTML contexts to prevent script execution. Utilizing security libraries or frameworks that automatically handle XSS protection can reduce human error. Web application firewalls (WAFs) can provide an additional layer of defense by detecting and blocking malicious payloads targeting this parameter. Organizations should monitor for suspicious activity related to user registration and educate users about the risks of interacting with untrusted links. Finally, contacting the vendor or community maintaining the SourceCodester Doctor Appointment System to request or develop an official patch is recommended to ensure long-term security.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T20:36:31.415Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1390232ffcdb8a2f493bc

Added to database: 2/27/2026, 6:26:10 AM

Last enriched: 2/27/2026, 6:42:05 AM

Last updated: 2/27/2026, 8:55:21 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses