OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clinician privileges to inject malicious JavaScript that executes when other users view the form. This enables session hijacking, account takeover, and privilege escalation from clinician to administrator. Version 8.0.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/commit/5f20b756441fc9868f43410a9ef97536c38b2ba6 | Patch |
| https://github.com/openemr/openemr/security/advisories/GHSA-mf62-q2xc-hxm3 | Exploit Vendor Advisory |
Configurations
History
25 Feb 2026, 17:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openemr/openemr/commit/5f20b756441fc9868f43410a9ef97536c38b2ba6 - Patch | |
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-mf62-q2xc-hxm3 - Exploit, Vendor Advisory | |
| First Time |
Open-emr openemr
Open-emr |
|
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* |
25 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 02:16
Updated : 2026-02-25 17:01
NVD link : CVE-2025-69231
Mitre link : CVE-2025-69231
CVE.ORG link : CVE-2025-69231
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
