CVE-2026-33348: OpenEMR RCE — Patch Guide
CVE-2026-33348
Stored XSS in OpenEMR prior to 8.0.0.3 lets authenticated attackers hijack sessions, steal patient data. Upgrade immediately to v8.0.0.3 to block exploitation.
Vendor-confirmed - CVE-2026-33348 is a high remote code execution in OpenEMR prior to 8.0.0.3 that lets authenticated attackers inject stored JavaScript to steal session tokens and take over accounts. Upgrade to version 8.0.0.3 now.
Overview
A high-severity stored cross-site scripting (XSS) vulnerability, tracked as CVE-2026-33348, has been discovered in OpenEMR, a widely used open-source electronic health records and practice management system. This flaw enables authenticated attackers to inject malicious code into the application, which is then executed by other users.
Vulnerability Details
In OpenEMR versions prior to 8.0.0.3, the function responsible for displaying answers on the “Eye Exam” form within patient encounters does not properly sanitize user input. An authenticated user assigned the specific “Notes - my encounters” role can enter malicious JavaScript code as answers in this form. This malicious payload is then stored in the system.
When another user with the same role views the patient encounter page or visit history where these form answers are displayed, the embedded script automatically executes in their browser. This type of attack is known as stored or persistent XSS, as the harmful code resides within the application’s data.
Impact and Risks
With a CVSS score of 8.7 (HIGH), this vulnerability poses a significant risk. Successful exploitation could allow an attacker to:
- Steal sensitive session cookies or authentication tokens, potentially leading to full account takeover.
- Perform actions on behalf of the victim user within the OpenEMR system, such as modifying patient records, scheduling, or billing information.
- Redirect users to malicious websites or deploy further malware. Given that OpenEMR manages protected health information (PHI), such a breach could lead to severe compliance violations (like HIPAA penalties), data theft, and operational disruption. For context on the real-world impact of healthcare data breaches, you can review recent incidents in our breach reports.
Remediation and Mitigation
The primary and most critical action is to apply the official patch.
Immediate Action:
- Upgrade: All users must upgrade their OpenEMR installation to version 8.0.0.3 or later immediately. This version contains the necessary fix to properly sanitize input and neutralize this XSS flaw.
- Verify: After upgrading, administrators should audit user accounts to ensure the principle of least privilege is followed, especially concerning the “Notes - my encounters” role.
Temporary Mitigation (if immediate upgrade is impossible):
- Review and restrict the assignment of the “Notes - my encounters” role to only strictly necessary, trusted personnel.
- Educate users with this role to be vigilant and report any suspicious content within form fields.
Staying informed about such vulnerabilities is crucial for maintaining security. For the latest updates on threats and patches, follow our security news.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search func...
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an SQL injection vulnerability in the Patient REST API endpoint allows ...
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which do...
SiYuan is a personal knowledge management system. Prior to version 3.6.2, a vulnerability allows crafted block attribute values to bypass server-side attribute escaping when an HTML entity is mixed wi...
Other Open-emr Openemr Vulnerabilities
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search func...
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an SQL injection vulnerability in the Patient REST API endpoint allows ...