Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clinician privileges to inject malicious JavaScript that executes when other users view the form. This enables session hijacking, account takeover, and privilege escalation from clinician to administrator. Version 8.0.0 fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | < 8.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/commit/5f20b756441fc9868f43410a9ef97536c38b2bPatch
- https://github.com/openemr/openemr/security/advisories/GHSA-mf62-q2xc-hxm3ExploitVendor Advisory
FAQ
What is CVE-2025-69231?
CVE-2025-69231 is a vulnerability with a CVSS score of 8.7 (HIGH). OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assess...
How severe is CVE-2025-69231?
CVE-2025-69231 has been rated HIGH with a CVSS base score of 8.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-69231?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.