CVE-2025-43860
OpenEMR vulnerability analysis and mitigation

Overview

A stored cross-site scripting (XSS) vulnerability was discovered in OpenEMR, a free and open source electronic health records and medical practice management application. The vulnerability (CVE-2025-43860) was disclosed on May 23, 2025, affecting versions prior to 7.0.3.4. It allows authenticated users with patient creation and editing privileges to inject arbitrary JavaScript code into the system through various address fields in the Patient Demographics section (GitHub Advisory, NVD).

Technical details

The vulnerability exists in the file openemr/library/templates/addresslistform.php where unsanitized values are assigned to fullAddress[0] and dynamically displayed on the webpage. The issue occurs in two scenarios: during form input and when form data is loaded for editing. The vulnerability affects both text box fields (Address, Address Line 2, Postal Code, City) and dropdown menu options (Address Use, State, Country). The vulnerability has been assigned a CVSS v3.1 score of 7.6 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N (GitHub Advisory, Wiz).

Impact

The vulnerability affects all users who view or edit patient records, including administrators, clinicians, and other staff. Attackers could potentially hijack sessions, execute unauthorized actions, or exfiltrate sensitive information such as patient records and credentials. The stored nature of the XSS makes it particularly dangerous as the malicious script executes automatically upon viewing affected patient records (GitHub Advisory, Wiz).

Mitigation and workarounds

The vulnerability has been patched in OpenEMR version 7.0.3.4. Users are advised to upgrade to this version or later to address the security issue. The fix involves proper sanitization and escaping of user input in the affected address fields (GitHub Advisory, Wiz).

Additional resources


SourceThis report was generated using AI

Related OpenEMR vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-22611CRITICAL9.8
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesApr 03, 2025
CVE-2025-43860HIGH7.6
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesMay 23, 2025
CVE-2025-32794HIGH7.6
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesMay 23, 2025
CVE-2025-31121HIGH7
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesApr 01, 2025
CVE-2025-32967MEDIUM5.4
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesMay 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management