{"id":85985,"date":"2025-12-07T21:58:10","date_gmt":"2025-12-07T21:58:10","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"-0001-11-30T06:00:00","slug":"cve-2025-43860-xss-vulnerability-in-openemr-leading-to-potential-system-compromise-or-data-leakage","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-43860-xss-vulnerability-in-openemr-leading-to-potential-system-compromise-or-data-leakage\/","title":{"rendered":"<strong>CVE-2025-43860: XSS Vulnerability in OpenEMR Leading to Potential System Compromise or Data Leakage<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>This report focuses on the CVE-2025-43860 vulnerability found in the OpenEMR, an open-source electronic health records and medical practice management application. This vulnerability, a stored cross-site scripting (XSS) issue, affects versions prior to 7.0.3.4 and could allow an authenticated user with patient creation and editing privileges to inject malicious JavaScript code into the system, potentially leading to system compromise or data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-43860<br \/>\nSeverity: High (7.6 CVSS)<br \/>\nAttack Vector: Web-based<br \/>\nPrivileges Required: Low (Authenticated user with editing privileges)<br \/>\nUser Interaction: Required<br \/>\nImpact: Potential system compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3322567218\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>OpenEMR | Prior to 7.0.3.4<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>An authenticated user with patient creation and editing privileges can exploit this vulnerability by entering malicious JavaScript payloads into the Text Box fields of Address, Address Line 2, Postal Code and City fields, as well as the Drop Down menu options of Address Use, State and Country in the Contact tab&#8217;s Additional Addresses section. The injected script can execute in two scenarios: (1) dynamically during form input, and (2) when the form data is later loaded for editing.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-4084590326\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual example of how the vulnerability might be exploited using a malicious JavaScript payload:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/OpenEMR\/endpoint HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{\n&quot;additional_address&quot;: {\n&quot;address&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;,\n&quot;address_line_2&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;,\n&quot;postal_code&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;,\n&quot;city&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;,\n&quot;address_use&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;,\n&quot;state&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;,\n&quot;country&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;\n}\n}<\/code><\/pre>\n<p>This exploit could result in arbitrary JavaScript code execution whenever the injected data is loaded, potentially compromising the system or causing data leakage. Users are strongly advised to update to version 7.0.3.4 or later, which contains a patch for this vulnerability. Alternatively, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) could be utilized as a temporary mitigation measure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview This report focuses on the CVE-2025-43860 vulnerability found in the OpenEMR, an open-source electronic health records and medical practice management application. This vulnerability, a stored cross-site scripting (XSS) issue, affects versions prior to 7.0.3.4 and could allow an authenticated user with patient creation and editing privileges to inject malicious JavaScript code into the system, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-85985","post","type-post","status-publish","format-standard","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/85985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=85985"}],"version-history":[{"count":0,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/85985\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=85985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=85985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=85985"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=85985"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=85985"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=85985"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=85985"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=85985"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=85985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}