We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32794

OpenEMR Stored XSS via Patient Name Field in Procedure Orders



Description

OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient's encounter under Orders → Procedure Orders. Version 7.0.3.4 contains a patch for the issue.

Reserved 2025-04-10 | Published 2025-05-23 | Updated 2025-05-23 | Assigner GitHub_M


HIGH: 7.6CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 7.0.3.4
affected

References

github.com/...penemr/security/advisories/GHSA-3c27-2m7h-f7rx

cve.org (CVE-2025-32794)

nvd.nist.gov (CVE-2025-32794)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32794

Support options

Helpdesk Chat, Email, Knowledgebase