Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/openemr/openemr/pull/2685 | third party advisory |
https://github.com/lodestone-security/CVEs/blob/master/CVE-2019-16862/README.md | third party advisory |