First published: Tue Aug 20 2019(Updated: )
In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the document_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | <=5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3965 is categorized as a medium severity vulnerability due to its potential for reflected XSS attacks.
To fix CVE-2019-3965, upgrade OpenEMR to version 5.0.2 or later where the vulnerability has been patched.
CVE-2019-3965 allows an attacker to execute arbitrary JavaScript in the user's session, potentially compromising their data.
CVE-2019-3965 affects OpenEMR versions up to and including 5.0.1.
Yes, CVE-2019-3965 can be exploited remotely by an attacker via crafted requests sent to the affected system.