Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.4
OpenEMR: Dynamic Code Picker Renders Unescaped Descriptions (Stored XSS)
CVE-2026-32124
GHSA-9hw7-22mr-qhfc
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the dynamic code picker AJAX endpoint returns code descriptions (code_text) that are rendered in the front end (e.g. DataTables) without HTML escaping. If an administrator (or u...
Original title
OpenEMR: Dynamic Code Picker Renders Unescaped Descriptions (Stored XSS)
Original description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the dynamic code picker AJAX endpoint returns code descriptions (code_text) that are rendered in the front end (e.g. DataTables) without HTML escaping. If an administrator (or user with code management rights) creates or edits a code with a malicious description containing script, that script runs in the browser of every user who uses the picker. This vulnerability is fixed in 8.0.0.1.
osv CVSS3.1
5.4
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 11 Mar 2026 · Updated: 14 Mar 2026 · First seen: 14 Mar 2026