### [CVE-2021-25921](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25921) ![](https://img.shields.io/static/v1?label=Product&message=openemr&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.7.3-rc1%2C%202.8.0%2C%202.8.1%2C%202.8.2%2C%202.8.3%2C%202.9.0%2C%203.0.0%2C%203.0.1%2C%203.1.0%2C%203.2.0%2C%204.0.0%2C%204.1.0%2C%204.1.1%2C%204.1.2%2C%204.1.2.3%2C%204.1.2.6%2C%204.1.2.7%2C%204.2.0%2C%204.2.0.3%2C%204.2.1%2C%204.2.2%2C%205.0.0%2C%205.0.0.5%2C%205.0.0.6%2C%205.0.1%2C%205.0.1.1%2C%205.0.1.2%2C%205.0.1.3%2C%205.0.1.4%2C%205.0.1.5%2C%205.0.1.6%2C%205.0.1.7%2C%205.0.2%2C%205.0.2.1%2C%205.0.2.2%2C%205.0.2.3%2C%205.0.2.4%2C%206.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site-Scripting&color=brightgreen) ### Description In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the `Allergies` section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit. ### POC #### Reference - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25921 #### Github No PoCs found on GitHub currently.