๐Ÿ” CVE Alert

CVE-2026-21443

UNKNOWN 0.0

OpenEMR allows inconsistent escaping of translation function output

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the `xl()` translation function returns unescaped strings. While wrapper functions exist for escaping in different contexts (`xlt()` for HTML, `xla()` for attributes, `xlj()` for JavaScript), there are places in the codebase where `xl()` output is used directly without escaping. If an attacker could insert malicious content into the translation database, these unescaped outputs could lead to XSS. Version 8.0.0 fixes the issue.

CWE CWE-116
Vendor openemr
Product openemr
Published Feb 25, 2026
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for openemr openemr

Be the first to know when new unknown vulnerabilities affecting openemr openemr are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

openemr / openemr
< 8.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openemr/openemr/security/advisories/GHSA-3f9j-cqjj-7h46 github.com: https://github.com/openemr/openemr/commit/b1e3fe8a9ed8bcaf17e0b73d7fad5434f9fe36da