First published: Mon Mar 22 2021(Updated: )
In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the `Allergies` section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | >=2.7.3<=6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25921 is a vulnerability in OpenEMR versions 2.7.3-rc1 to 6.0.0 that allows for Stored Cross-Site Scripting (XSS) attacks.
CVE-2021-25921 works by exploiting the lack of proper user input validation in the 'Allergies' section of OpenEMR, allowing an attacker to inject and execute malicious scripts.
CVE-2021-25921 has a severity rating of medium with a CVSS score of 5.4.
To fix CVE-2021-25921, users should update OpenEMR to version 6.0.0 or apply the corresponding patch provided by the vendor.
You can find more information about CVE-2021-25921 on the GitHub repository for OpenEMR and the WhiteSource Software vulnerability database.