{"id":"CVE-2020-13563","details":"A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter.","modified":"2026-03-14T10:11:14.641780Z","published":"2021-02-01T16:15:12.483Z","references":[{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2020-1177"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openemr/openemr","events":[{"introduced":"0"},{"last_affected":"35a67d11567419866d8aa9de0ae355676eeebede"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.0.2"}]}}],"versions":["v2_7_2","v2_7_2-rc1","v2_7_2-rc2","v2_7_3-rc1","v2_8_0","v2_8_1","v2_8_2","v2_8_3","v2_9_0","v3_0_0","v3_0_1","v5_0_2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-13563.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.3.7"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}