Ad

CVE-2026-33346

HIGH CVSS 3.1: 8.7 EPSS 0.03%
Updated Mar 20, 2026
PHP
Parameter Value
CVSS 8.7 (HIGH)
Affected Versions before 8.0.0.2
Fixed In 8.0.0.2
Type CWE-79 (Cross-Site Scripting (XSS))
Vendor PHP
Public PoC No

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, a stored cross-site scripting (XSS) vulnerability in the patient portal payment flow allows a patient portal user to persist arbitrary JavaScript that executes in the browser of a staff member who reviews the payment submission. The payload is stored via `portal/lib/paylib.php` and rendered without escaping in `portal/portal_payment.php`.

Version 8.0.0.2 fixes the issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Open-Emr Openemr
cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
8.0.0.2