OpenEMR 5.0.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript through user profile parameters. Attackers can exploit the vulnerability by crafting a malicious payload to download and execute a web shell, enabling remote command execution on the vulnerable OpenEMR instance.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenEMR 5.0.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript through user profile parameters. Attackers can exploit the vulnerability by crafting a malicious payload to download and execute a web shell, enabling remote command execution on the vulnerable OpenEMR instance. | |
| Title | OpenEMR 5.0.2.1 - Remote Code Execution | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-21T17:27:33.562Z
Reserved: 2026-01-14T17:11:19.896Z
Link: CVE-2021-47817
No data.
Status : Received
Published: 2026-01-21T18:16:09.633
Modified: 2026-01-21T18:16:09.633
Link: CVE-2021-47817
No data.
OpenCVE Enrichment
No data.