Reflected Cross Site Scripting in openemr/openemr


Reported on

Mar 21st 2022

Vulnerability Type

Reflected Cross Site-Scripting (XSS)

Affected URL


Affected Parameters


Authentication Required?


Issue Summary

A reflected XSS vulnerability found in “/interface/main/calendar/index.php” that allows Admin user to inject arbitrary web script in one parameter (newname). The XSS payload will be reflected in the Confirmation page after the user click on Save for the new categories in Calendar.


Ensure to HTML encode before inserting any untrusted data into HTML element content. Ensure all inputs entered by user should be sanitized and validated before processing and storage. Inputs should be filtered by the application, for example removing special characters such as < and > as well as special words such as script.


Aden Yap Chuen Zhen (
Rizan, Sheikh ( Ali Radzali (

Issue Reproduction

Login as an Admin. Click on Administration > Clinic > Calendar and click on Categories after that.

1.png Figure 1: Login as Admin and Go to Calendar (Under Administration)

In New Category, insert this payload in the Name input box. Once done, click on Save.


2.png Figure 2: Insert Payload in Name

The XSS will be reflected on the confirmation page with the user cookies.

3.png Figure 3: Reflected XSS in Confirmation Page

We are processing your report and will contact the openemr team within 24 hours. 2 years ago
r00t.pgp modified the report
2 years ago
r00t.pgp modified the report
2 years ago
We have contacted a member of the openemr team and are waiting to hear back 2 years ago
openemr/openemr maintainer validated this vulnerability 2 years ago
r00t.pgp has been awarded the disclosure bounty
The fix bounty is now up for grabs
openemr/openemr maintainer
2 years ago


This has been fixed in OpenEMR

openemr/openemr maintainer marked this as fixed in with commit 347ad6 2 years ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
2 years ago


Hi, Kindly issue a CVE for this vulnerability. Tq

2 years ago


Dear @admin I've already ping the maintainer, could you please follow up on the CVE creation? Tq

Dear @maintainer, could you kindly confirm that CVE can be created for this report? Tq

openemr/openemr maintainer
2 years ago


Also note that this fix is also in the recently released 6.1.0 version.

I consent to creation of CVE.

Jamie Slome
2 years ago


Sorted 👍

to join this conversation