๐Ÿ” CVE Alert

CVE-2021-47817

MEDIUM 5.4

OpenEMR 5.0.2.1 - Remote Code Execution

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

OpenEMR 5.0.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript through user profile parameters. Attackers can exploit the vulnerability by crafting a malicious payload to download and execute a web shell, enabling remote command execution on the vulnerable OpenEMR instance.

CWE CWE-79
Vendor openemr foundation, inc.
Product openemr
Published Jan 21, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for openemr foundation, inc. openemr

Be the first to know when new medium vulnerabilities affecting openemr foundation, inc. openemr are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

OpenEMR Foundation, Inc. / OpenEMR
5.0.2.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/49784 open-emr.org: https://www.open-emr.org/ sourceforge.net: https://sourceforge.net/projects/openemr/files/OpenEMR%20Current/5.0.2.1/openemr-5.0.2.tar.gz/download blog.sonarsource.com: https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability?utm_medium=cpc&utm_source=twitter&utm_campaign=openemr&utm_term=security&utm_content=tofu youtube.com: https://www.youtube.com/watch?v=H8VWNwWgYJo&feature=emb_logo vulncheck.com: https://www.vulncheck.com/advisories/openemr-remote-code-execution

Credits

Hato0, BvThTrd