A flaw has been found in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected by this issue is some unknown functionality of the file /checkin.php. This manipulation of the argument patient_id causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.344852 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344852 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.747921 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
10 Feb 2026, 14:49
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pamzey patients Waiting Area Queue Management System
Pamzey |
|
| CPE | cpe:2.3:a:pamzey:patients_waiting_area_queue_management_system:1.0:*:*:*:*:*:*:* | |
| References | () https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Patients-Waiting-Area-Queue-Management-System-checkin-php-XSS.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.344852 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.344852 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.747921 - Third Party Advisory, VDB Entry |
08 Feb 2026, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-08 12:15
Updated : 2026-02-10 14:49
NVD link : CVE-2026-2150
Mitre link : CVE-2026-2150
CVE.ORG link : CVE-2026-2150
JSON object : View
Products Affected
pamzey
- patients_waiting_area_queue_management_system
