{"id":"CVE-2021-32103","details":"A Stored XSS vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.1 allows a admin authenticated user to inject arbitrary web script or HTML via the lname parameter.","modified":"2026-04-12T03:26:21.593625Z","published":"2021-05-07T04:15:07.460Z","references":[{"type":"ADVISORY","url":"https://blog.sonarsource.com/openemr-5-0-2-1-command-injection-vulnerability"},{"type":"ADVISORY","url":"https://community.open-emr.org/t/openemr-5-0-2-patch-5-has-been-released/15431"},{"type":"ADVISORY","url":"https://community.sonarsource.com/t/openemr-5-0-2-1-command-injection-vulnerability-puts-health-records-at-risk/33592"},{"type":"ADVISORY","url":"https://portswigger.net/daily-swig/healthcare-security-openemr-fixes-serious-flaws-that-lead-to-command-execution-in-patient-portal"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openemr/openemr","events":[{"introduced":"0"},{"last_affected":"728f4bdd4f8c729944c5544589f81374cec7c4f4"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"5.0.2.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"}}],"versions":["v2_7_2","v2_7_2-rc1","v2_7_2-rc2","v2_7_3-rc1","v2_8_0","v2_8_1","v2_8_2","v2_8_3","v2_9_0","v3_0_0","v3_0_1","v5_0_2","v5_0_2_1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-32103.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N"}]}