CVE-2026-24848

CRITICAL
2026-03-03 [email protected]
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 22:05 vuln.today
PoC Detected
Mar 04, 2026 - 21:58 vuln.today
Public exploit code
CVE Published
Mar 03, 2026 - 22:16 nvd
CRITICAL 9.9

Description

OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells.

Analysis

Path traversal in OpenEMR 7.0.4 disposeDocument() allows file access. PoC available.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all OpenEMR deployments and identify those running version 7.0.4 or earlier; restrict access to EtherFax functionality to essential personnel only. Within 7 days: Implement network segmentation to limit lateral movement from compromised OpenEMR instances; enable enhanced logging and monitoring for file write operations. …

Sign in for detailed remediation steps.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +50
POC: +20

Share

CVE-2026-24848 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy