Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.4

OpenEMR: Malicious Code Can Be Injected into Patient Demographics

CVE-2026-32121
Summary

A security flaw in OpenEMR's electronic health records system allowed malicious code to be injected into the patient demographics section, potentially allowing an attacker to manipulate the information displayed on printed prescriptions. This flaw has been fixed in version 8.0.0.1. Affected users should update to the latest version to ensure their system is secure.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
open-emr openemr <= 8.0.0.1 –
Original title
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, Stored XSS in prescription CSS/HTML print view via patient demographics. ...
Original description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, Stored XSS in prescription CSS/HTML print view via patient demographics. That finding involves server-side rendering of patient names via raw PHP echo. This finding involves client-side DOM-based rendering via jQuery .html() in a completely different component (portal/sign/assets/signer_api.js). The two share the same root cause (unsanitized patient names in patient_data), but they have different sinks, different affected components, different trigger actions, and require independent fixes. This vulnerability is fixed in 8.0.0.1.
nvd CVSS3.1 7.7
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
Published: 11 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026