๐Ÿ” CVE Alert

CVE-2026-33933

MEDIUM 6.1

Reflected XSS via Unescaped contextName Parameter in Custom Template Editor

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
9th

OpenEMR is a free and open source electronic health records and medical practice management application. Starting in version 7.0.2.1 and prior to version 8.0.0.3, a reflected cross-site scripting (XSS) vulnerability in the custom template editor allows an attacker to execute arbitrary JavaScript in an authenticated staff member's browser session by sending them a crafted URL. The attacker does not need an OpenEMR account. Version 8.0.0.3 patches the issue.

CWE CWE-79
Vendor openemr
Product openemr
Published Mar 25, 2026
Last Updated Mar 26, 2026
Stay Ahead of the Next One

Get instant alerts for openemr openemr

Be the first to know when new medium vulnerabilities affecting openemr openemr are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

openemr / openemr
>= 7.0.2.1, < 8.0.0.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openemr/openemr/security/advisories/GHSA-9qh7-cfq4-j7c3 github.com: https://github.com/openemr/openemr/commit/d5c8d49ef19983472b2d7db0dbebd2dac9d6a200 github.com: https://github.com/openemr/openemr/commit/de9b6eb0da574430e8223c014cf4a05b0adc29d8 github.com: https://github.com/openemr/openemr/releases/tag/v8_0_0_3