VYPR
Medium severity5.4NVD Advisory· Published May 7, 2026· Updated May 7, 2026

CVE-2026-36388

CVE-2026-36388

Description

A Cross-Site Scripting (XSS) vulnerability was found in PHPGurukal Hospital Management System v4.0 in the /hospital/hms/edit-profile.php page. This flaw allows an authenticated attacker (patient) to inject a malicious script payload into the User Name parameter, which is stored in the application and later rendered in the doctor s interface.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated patient can inject a stored XSS payload via the User Name param in PHPGurukal Hospital Management System v4.0, leading to session hijacking and account takeover.

Vulnerability

Overview

CVE-2026-36388 describes a stored Cross-Site Scripting (XSS) vulnerability in PHPGurukal Hospital Management System v4.0, specifically within the /hospital/hms/edit-profile.php page. The flaw. The application fails to sanitize the User Name parameter, allowing an authenticated patient to inject arbitrary JavaScript injection. The payload is stored in the database and later rendered unescaped when a doctor accesses /hospital/hms/doctor/appointment-history.php – a classic case of persistent XSS [1].

Exploitation

Scenario

An attacker with a valid patient account can inject a malicious script, such as one that exfiltrates session cookies via Burp Collaborator, into the User Name field. After saving the profile, the attacker books an appointment with a doctor (/hospital/hms/book-appointment.php). When the doctor views the appointment history, the stored payload executes in the doctor's browser, sending the session cookie to an attacker-controlled server [1].

Impact

A successful attack allows the attacker to hijack the doctor's session by replaying the stolen cookie, effectively taking over the doctor's account without authentication. This grants unauthorized access to sensitive patient data and administrative functions, with the official advisory noting potential for session hijacking and account takeover [1].

Mitigation

As of the advisory publication (May 2026), no patch has been released for v4.0. The vendor has not commented on a fix timeline. Affected organizations should implement output encoding for careful validate and sanitize user inputs and consider applying a generic Web Application Firewall (WAF) rule the offending parameter until an official update is available [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.