CVE-2026-33911
MEDIUMOpenEMR vulnerable to reflected XSS in graphs.php via title parameter
Title source: cnaDescription
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the POST parameter `title` is reflected back in a JSON response built with `json_encode()`. Because the response is served with a `text/html` Content-Type, the browser interprets injected HTML/script tags rather than treating the output as JSON. An authenticated attacker can craft a request that executes arbitrary JavaScript in a victim's session. Version 8.0.0.3 contains a fix.
References (3)
Scores
CVSS v3
5.4
EPSS
0.0003
EPSS Percentile
9.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
open-emr/openemr
< 8.0.0.3
openemr/openemr
< 8.0.0.3
Published
Mar 25, 2026
Tracked Since
Mar 26, 2026