{"id":"CVE-2020-13562","details":"A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnaerability in the phpGACL template action parameter.","modified":"2026-04-11T12:29:59.909019Z","published":"2021-02-01T16:15:12.407Z","database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:a:phpgacl_project:phpgacl:3.3.7:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"3.3.7"}]}]},"references":[{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openemr/openemr","events":[{"introduced":"0"},{"last_affected":"35a67d11567419866d8aa9de0ae355676eeebede"}],"database_specific":{"cpe":"cpe:2.3:a:open-emr:openemr:5.0.2:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"5.0.2"}]}}],"versions":["v2_7_2","v2_7_2-rc1","v2_7_2-rc2","v2_7_3-rc1","v2_8_0","v2_8_1","v2_8_2","v2_8_3","v2_9_0","v3_0_0","v3_0_1","v5_0_2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-13562.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}