OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, a stored cross-site scripting (XSS) vulnerability in the patient portal payment flow allows a patient portal user to persist arbitrary JavaScript that executes in the browser of a staff member who reviews the payment submission. The payload is stored via `portal/lib/paylib.php` and rendered without escaping in `portal/portal_payment.php`. Version 8.0.0.2 fixes the issue.
Use CWE-79, Open-Emr vendor hub and Openemr product page to widen CVE-2026-33346 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-33917, CVE-2026-34055 and CVE-2026-34056 for nearby disclosures in the same product family.