CVE-2025-43860

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-43860
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-43860.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-43860
Aliases
  • GHSA-2h9p-7vmc-wmqv
Published
2025-05-23T16:15:25Z
Modified
2025-07-03T02:59:38.354669Z
Summary
[none]
Details

OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation and editing privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the (1) Text Box fields of Address, Address Line 2, Postal Code and City fields and (2) Drop Down menu options of Address Use, State and Country of the Additional Addresses section of the Contact tab in Patient Demographics. The injected script can execute in two scenarios: (1) dynamically during form input, and (2) when the form data is later loaded for editing. Version 7.0.3.4 contains a patch for the issue.

References

Affected packages

Git / github.com/openemr/openemr

Affected ranges

Type
GIT
Repo
https://github.com/openemr/openemr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

v2_7_2
v2_7_2-rc1
v2_7_2-rc2
v2_7_3-rc1
v2_8_0
v2_8_1
v2_8_2
v2_8_3
v2_9_0
v3_0_0
v3_0_1
v7_0_3
v7_0_3_1
v7_0_3_2
v7_0_3_3