OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient's encounter under Orders ? Procedure Orders. Version 7.0.3.4 contains a patch for the issue.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx | Exploit Vendor Advisory |
| https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx | Exploit Vendor Advisory |
Configurations
History
02 Jul 2025, 00:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx - Exploit, Vendor Advisory | |
| First Time |
Open-emr openemr
Open-emr |
|
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* |
23 May 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-23 16:15
Updated : 2025-07-02 00:45
NVD link : CVE-2025-32794
Mitre link : CVE-2025-32794
JSON object : View
Products Affected
open-emr
- openemr
CWE
No CWE.
