Unrated severityNVD Advisory· Published Mar 19, 2026· Updated Mar 24, 2026
OpenEMR Vulnerable to Stored XSS via Unescaped portal_login_username in Credential Print View
CVE-2026-33303
Description
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 are vulnerable to stored cross-site scripting (XSS) via unescaped portal_login_username in the portal credential print view. A patient portal user can set their login username to an XSS payload, which then executes in a clinic staff member's browser when they open the "Create Portal Login" page for that patient. This crosses from the patient session context into the staff/admin session context. Version 8.0.0.2 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/openemr/openemr/commit/c32139b5144b1c704015221520ad2f931e25f10dmitrex_refsource_MISC
- github.com/openemr/openemr/security/advisories/GHSA-cp37-pmfx-5mhmmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.