OpenEMR, Stored Cross-Site Scripting (XSS), CVE-2025-32794 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in OpenEMR (versions < 7.0.3.4) allows authenticated attackers with patient creation privileges to inject malicious JavaScript payloads into the First and Last Name fields during patient registration. The payload persists in the database and executes when healthcare staff view the patient’s encounter under Orders β†’ Procedure Orders. This stored XSS bypasses input sanitization, enabling session hijacking, phishing, or privilege escalation. The flaw stems from improper neutralization of user-supplied data before rendering in the web interface.

DailyCVE Form

Platform: OpenEMR
Version: < 7.0.3.4
Vulnerability: Stored XSS
Severity: Critical
Date: 05/23/2025

Prediction: Patch expected by 08/15/2025

What Undercode Say

SELECT FROM patient_data WHERE first_name LIKE '%<script>%';
// Vulnerable code snippet (simplified)
echo "<td>" . $row['first_name'] . "</td>";

How Exploit

1. Authenticate as low-privilege user.

2. Create patient with `` as name.

3. Trigger XSS via Procedure Orders view.

Protection from this CVE

  • Upgrade to OpenEMR 7.0.3.4+.
  • Implement CSP headers.
  • Sanitize user input/output.

Impact

  • Unauthorized admin actions.
  • Patient data theft.
  • Session compromise.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top