First published: Mon Oct 21 2019(Updated: )
Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | >=5.0.0<5.0.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16862 has a medium severity rating due to its potential to allow arbitrary code execution in the context of a user's session.
To fix CVE-2019-16862, upgrade to OpenEMR version 5.0.2.1 or later.
CVE-2019-16862 affects OpenEMR versions prior to 5.0.2.1.
Yes, CVE-2019-16862 can be exploited remotely by an attacker using the pid parameter.
CVE-2019-16862 is a reflected Cross-Site Scripting (XSS) vulnerability.