Impact
OpenEMR’s graphs.php endpoint reflected the POST parameter title back in a JSON response that was served as text/html, allowing an attacker to inject arbitrary JavaScript that would run in the context of an authenticated user’s session. The flaw is a reflected cross‑site scripting vulnerability that can compromise confidentiality and integrity by executing code with the victim’s privileges.
Affected Systems
The flaw affects legacy releases of the OpenEMR electronic health records platform, specifically any version prior to 8.0.0.3. The product is free and widely deployed for medical practice management.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, and the EPSS score is below 1%, suggesting low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authentication to the application and the ability to send a crafted POST request to graphs.php; there are no known publicly available exploits at this time.
OpenCVE Enrichment