OpenEMR, Stored Cross-Site Scripting (XSS), CVE-2025-43860 (Critical)

Listen to this Post

How the CVE Works

The vulnerability in OpenEMR (versions < 7.0.3.4) allows authenticated attackers with patient editing privileges to inject malicious JavaScript via input fields in the Patient Demographics section. The payload executes in two scenarios: (1) dynamically during form input, and (2) when the form is reloaded for editing. Attackers exploit insufficient input sanitization in Text Box (Address, City, etc.) and Drop Down (State, Country) fields, enabling persistent XSS attacks. The patched version (7.0.3.4) implements proper sanitization.

DailyCVE Form

Platform: OpenEMR
Version: < 7.0.3.4
Vulnerability: Stored XSS
Severity: Critical
Date: 05/23/2025

Prediction: Patch expected by 06/15/2025

What Undercode Say

Check OpenEMR version
grep -i "version" /var/www/openemr/sqlconf.php
Exploit PoC (malicious payload example)
<script>alert('XSS')</script>
Verify patch
diff -r /var/www/openemr /patched/openemr-7.0.3.4

How Exploit

1. Authenticate as a low-privilege user.

2. Inject malicious script into Patient Demographics fields.

  1. Trigger execution via form reload or dynamic input.

Protection from this CVE

  • Upgrade to OpenEMR 7.0.3.4.
  • Implement CSP headers.
  • Sanitize user inputs server-side.

Impact

  • Session hijacking.
  • Unauthorized data access.
  • Malware delivery.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

πŸ”JOIN OUR CYBER WORLD [ CVE News β€’ HackMonitor β€’ UndercodeNews ]

πŸ’¬ Whatsapp | πŸ’¬ Telegram

πŸ“’ Follow DailyCVE & Stay Tuned:

𝕏 formerly Twitter 🐦 | @ Threads | πŸ”— Linkedin Featured Image

Scroll to Top