LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2025-69231

CVE-2025-69231 - Vulnerability Analysis

HighCVSS: 8.7

Last Updated: February 25, 2026

OpenEMR - Stored XSS

Published: February 25, 2026Updated: February 25, 2026PoC AvailableRemote Exploitable

Overview

OpenEMR < 8.0.0 contains a stored cross-site scripting vulnerability caused by improper sanitization in the GAD-7 anxiety assessment form, letting authenticated clinicians execute malicious JavaScript, leading to session hijacking and privilege escalation.

Severity & Score

Severity: High
CVSS Score: 8.7
EPSS Score: 16.7%(Probability of exploitation in next 30 days)

Impact

Authenticated clinicians can hijack sessions, take over accounts, and escalate privileges to administrator.

Mitigation

Update to version 8.0.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

🟠 CVE-2025-69231 - High (8.7) OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clini... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2025-69231/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2025-69231
Severity
High
CVSS Score
8.7
Type
stored_xss
Status
confirmed
EPSS
16.7%
Social Posts
1

CWE

  • CWE-79

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

EPSS Score

16.7%Probability of exploitation in the next 30 days