CVE-2026-33911

MEDIUM

OpenEMR vulnerable to reflected XSS in graphs.php via title parameter

Title source: cna
STIX 2.1

Description

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the POST parameter `title` is reflected back in a JSON response built with `json_encode()`. Because the response is served with a `text/html` Content-Type, the browser interprets injected HTML/script tags rather than treating the output as JSON. An authenticated attacker can craft a request that executes arbitrary JavaScript in a victim's session. Version 8.0.0.3 contains a fix.

Scores

CVSS v3 5.4
EPSS 0.0003
EPSS Percentile 9.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-79
Status published
Products (2)
open-emr/openemr < 8.0.0.3
openemr/openemr < 8.0.0.3
Published Mar 25, 2026
Tracked Since Mar 26, 2026