Impact
OpenEMR versions 5.0.2 through 7.x leak the gateway_api_key directly into client‑side JavaScript. This key is a credential to the payment gateway and, if disclosed, an attacker could move funds or take over the merchant account. The vulnerability is catalogued as a Confidentiality breach (CWE‑200).
Affected Systems
The flaw affects the OpenEMR electronic health records application, specifically all releases from 5.0.2 up to, but not including, 8.0.0. Vendors and administrators should check the version of their OpenEMR deployment.
Risk and Exploitability
The CVSS score is 9.6, indicating critical severity. EPSS is reported as less than 1 %, suggesting a very low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is the web interface, where any user who can reach the payment pages receives the key in plaintext. An attacker simply needs to view the page source or capture the response to obtain the credential.
OpenCVE Enrichment