A stored cross-site scripting (XSS) vulnerability exists in openemr/openemr version 7.0.1. An attacker can inject malicious payloads into the 'inputBody' field in the Secure Messaging feature, which can then be sent to other users. When the recipient views the malicious message, the payload is executed, potentially compromising their account. This issue is fixed in version 7.0.2.1.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://huntr.com/bounties/16cba0fc-748d-4ea8-9573-1f6fbe9a27c9 | third party advisory exploit |
https://github.com/openemr/openemr/commit/d141d2ca06fb2171a202c7302dd5d5af8539f255 | patch |