๐Ÿ” CVE Alert

CVE-2026-33932

HIGH 7.6

OpenEMR has Stored XSS in CCDA Preview via Unsanitized linkHtml Attributes

CVSS Score
7.6
EPSS Score
0.0%
EPSS Percentile
8th

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a CCDA document to execute arbitrary JavaScript in a clinician's browser session when the document is previewed. The XSL stylesheet sanitizes attributes for all other narrative elements but not for `linkHtml`, allowing `href="javascript:..."` and event handler attributes to pass through unchanged. Version 8.0.0.3 patches the issue.

CWE CWE-79
Vendor openemr
Product openemr
Published Mar 25, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for openemr openemr

Be the first to know when new high vulnerabilities affecting openemr openemr are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

openemr / openemr
< 8.0.0.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openemr/openemr/security/advisories/GHSA-g77x-9p3x-2j8f github.com: https://github.com/openemr/openemr/commit/95e6078889b5399b12b59117f998560cd94bd47d github.com: https://github.com/openemr/openemr/releases/tag/v8_0_0_3