CVE-2025-69231

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clinician privileges to inject malicious JavaScript that executes when other users view the form. This enables session hijacking, account takeover, and privilege escalation from clinician to administrator. Version 8.0.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

25 Feb 2026, 17:01

Type Values Removed Values Added
References () https://github.com/openemr/openemr/commit/5f20b756441fc9868f43410a9ef97536c38b2ba6 - () https://github.com/openemr/openemr/commit/5f20b756441fc9868f43410a9ef97536c38b2ba6 - Patch
References () https://github.com/openemr/openemr/security/advisories/GHSA-mf62-q2xc-hxm3 - () https://github.com/openemr/openemr/security/advisories/GHSA-mf62-q2xc-hxm3 - Exploit, Vendor Advisory
First Time Open-emr openemr
Open-emr
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

25 Feb 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-25 02:16

Updated : 2026-02-25 17:01


NVD link : CVE-2025-69231

Mitre link : CVE-2025-69231

CVE.ORG link : CVE-2025-69231


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')