OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient's encounter under Orders → Procedure Orders. Version 7.0.3.4 contains a patch for the issue.
References
Configurations
No configuration.
History
28 May 2025, 14:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
23 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx - |
23 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-23 16:15
Updated : 2025-05-28 14:58
NVD link : CVE-2025-32794
Mitre link : CVE-2025-32794
CVE.ORG link : CVE-2025-32794
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')