Unrated severityNVD Advisory· Published Mar 25, 2026· Updated Mar 26, 2026
Reflected XSS via Unescaped contextName Parameter in Custom Template Editor
CVE-2026-33933
Description
OpenEMR is a free and open source electronic health records and medical practice management application. Starting in version 7.0.2.1 and prior to version 8.0.0.3, a reflected cross-site scripting (XSS) vulnerability in the custom template editor allows an attacker to execute arbitrary JavaScript in an authenticated staff member's browser session by sending them a crafted URL. The attacker does not need an OpenEMR account. Version 8.0.0.3 patches the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/openemr/openemr/commit/d5c8d49ef19983472b2d7db0dbebd2dac9d6a200mitrex_refsource_MISC
- github.com/openemr/openemr/commit/de9b6eb0da574430e8223c014cf4a05b0adc29d8mitrex_refsource_MISC
- github.com/openemr/openemr/releases/tag/v8_0_0_3mitrex_refsource_MISC
- github.com/openemr/openemr/security/advisories/GHSA-9qh7-cfq4-j7c3mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.