OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient's encounter under Orders → Procedure Orders. Version 7.0.3.4 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 23 May 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 23 May 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient's encounter under Orders → Procedure Orders. Version 7.0.3.4 contains a patch for the issue. | |
Title | OpenEMR Stored XSS via Patient Name Field in Procedure Orders | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-23T15:15:32.925Z
Updated: 2025-05-23T17:00:53.086Z
Reserved: 2025-04-10T12:51:12.281Z
Link: CVE-2025-32794

Updated: 2025-05-23T17:00:46.173Z

Status : Awaiting Analysis
Published: 2025-05-23T16:15:25.300
Modified: 2025-05-28T14:58:52.920
Link: CVE-2025-32794

No data.