Openemr

56 CVEs product

Monthly

CVE-2026-34056 HIGH This Week

Low-privilege authenticated users in OpenEMR versions up to and including 8.0.0.3 can view and download Ensora eRx error logs due to missing authorization checks, exposing sensitive healthcare system information. This broken access control vulnerability (CVSS 7.7) affects network-accessible installations and has a 3% EPSS exploitation probability (8th percentile), with no public exploit identified at time of analysis. No vendor-released patch identified at time of analysis according to the CVE disclosure.

Information Disclosure Openemr
NVD GitHub
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-33931 MEDIUM This Month

OpenEMR portal payment pages prior to version 8.0.0.3 expose other patients' protected health information (PHI) and payment card metadata through an Insecure Direct Object Reference vulnerability. Authenticated portal patients can manipulate the `recid` query parameter in `portal/portal_payment.php` to access arbitrary patient payment records and billing data without authorization. The vulnerability affects all versions before 8.0.0.3 and carries a CVSS score of 6.5 (high confidentiality impact); however, the 0.03% EPSS score indicates low real-world exploitation probability, and no public exploit code or active exploitation has been identified.

Openemr PHP Information Disclosure
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-33918 HIGH This Week

Improper access control in OpenEMR versions prior to 8.0.0.3 allows any authenticated user to download and permanently delete electronic claim batch files containing protected health information (PHI) via the billing file-download endpoint, regardless of whether they have billing privileges. The vulnerability has a 7.6 CVSS score with low attack complexity and requires only low-level authentication. EPSS exploitation probability is 0.03% (8th percentile), indicating low observed targeting in real-world exploitation at time of analysis, and no public exploit has been identified.

Openemr PHP Privilege Escalation Information Disclosure
NVD GitHub VulDB
CVSS 3.1
7.6
EPSS
0.0%
CVE-2026-33917 HIGH This Week

SQL injection in OpenEMR versions prior to 8.0.0.3 enables authenticated attackers to execute arbitrary SQL commands through the CAMOS form's ajax_save functionality, potentially leading to complete database compromise including extraction of sensitive health records, data modification, and service disruption. The vulnerability requires low-privilege authentication (PR:L) with no user interaction (UI:N) and is network-exploitable (AV:N), though EPSS assigns only 0.03% (8th percentile) exploitation probability and no public exploit identified at time of analysis. Vendor-released patch available in version 8.0.0.3.

Openemr SQLi PHP
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-33915 MEDIUM This Month

OpenEMR versions prior to 8.0.0.3 allow authenticated API users to bypass administrative access controls on five insurance company management REST API endpoints due to missing authorization checks. An attacker with valid API credentials but non-administrative OpenEMR privileges can create, read, and modify insurance company records without proper permission validation. The vulnerability requires prior authentication and affects data integrity rather than confidentiality or availability; no public exploit code has been identified, and exploitation probability is very low (EPSS 0.02%).

Openemr Privilege Escalation Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-32127 HIGH This Week

OpenEMR versions prior to 8.0.0.1 contain a SQL injection vulnerability in the ajax graphs library that allows authenticated users to execute arbitrary database queries, potentially leading to complete compromise of patient health records and system data. The vulnerability stems from insufficient input validation and requires valid credentials to exploit, but poses a critical risk given the sensitive nature of healthcare data stored in OpenEMR systems. No patch is currently available for affected versions.

SQLi Openemr
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-32126 HIGH This Week

OpenEMR versions prior to 8.0.0.1 contain an inverted boolean condition in the access control logic that allows any authenticated user to access administrative CDR controllers (alerts, ajax, edit, add, detail, browse) intended for administrators only. Affected users can suppress clinical decision support alerts, delete or modify clinical plans, and edit rule configurations without proper authorization. No patch is currently available for this high-severity vulnerability.

Authentication Bypass Openemr
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-32125 MEDIUM This Month

Stored cross-site scripting in OpenEMR versions prior to 8.0.0.1 allows authenticated users with Track Anything feature access to inject malicious scripts into item names that execute in the browsers of all users viewing the corresponding Dygraph charts. An attacker with create or edit permissions can craft payloads that run in victims' sessions without their knowledge, potentially enabling session hijacking or unauthorized actions within the application. No patch is currently available for affected versions.

XSS Openemr
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-32124 MEDIUM This Month

Stored cross-site scripting (XSS) in OpenEMR prior to 8.0.0.1 allows administrators or users with code management privileges to inject malicious scripts into code descriptions that execute in the browsers of all users accessing the dynamic code picker. All OpenEMR instances running affected versions are at risk, as any authenticated admin can inject payloads affecting the entire user base. No patch is currently available for this vulnerability.

XSS Openemr
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-32123 HIGH This Week

OpenEMR versions prior to 8.0.0.1 fail to properly enforce access controls on group encounters due to sensitivity checks only querying the wrong database table, allowing authenticated users to view restricted medical records such as mental health encounters they should not access. The vulnerability affects multi-user deployments where role-based restrictions are relied upon to protect sensitive patient information. No patch is currently available for affected versions.

Authentication Bypass Openemr
NVD GitHub VulDB
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-32122 MEDIUM This Month

OpenEMR versions prior to 8.0.0.1 fail to properly enforce access controls on the Claim File Tracker AJAX endpoint, allowing authenticated users without billing permissions to retrieve sensitive claim metadata including claim IDs, payer information, and transmission logs. An authenticated attacker with minimal privileges can access confidential billing information that should be restricted to authorized billing staff. No patch is currently available for affected installations.

Authentication Bypass Openemr
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-32121 HIGH This Week

Stored DOM-based cross-site scripting (XSS) in OpenEMR prior to version 8.0.0.1 allows authenticated attackers with low privileges to inject malicious scripts through unsanitized patient names in the portal signing component, which are rendered client-side via jQuery. Successful exploitation requires user interaction and could enable attackers to perform actions in the context of affected users or steal sensitive health information. A patch is available in OpenEMR 8.0.0.1 and later versions.

PHP XSS Openemr
NVD GitHub VulDB
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-32118 MEDIUM This Month

Stored XSS in OpenEMR's Pain Map form prior to version 8.0.0.1 allows authenticated users to inject malicious JavaScript into encounter records that executes when other clinicians view the affected form. Since session cookies lack HttpOnly protection, attackers can hijack sessions of other users including administrators. This vulnerability requires user interaction and network access but poses significant risk in multi-user healthcare environments.

XSS Openemr
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-25146 CRITICAL POC PATCH Act Now

Information disclosure in OpenEMR 5.0.2 to before 8.0.0 exposes sensitive data. PoC and patch available.

Information Disclosure Openemr
NVD GitHub
CVSS 3.1
9.6
EPSS
0.0%
CVE-2026-24898 CRITICAL POC PATCH Act Now

Unauthenticated token disclosure in OpenEMR before 8.0.0. CVSS 10.0. PoC and patch available.

Authentication Bypass Information Disclosure PHP Openemr
NVD GitHub
CVSS 3.1
10.0
EPSS
0.2%
CVE-2026-24848 CRITICAL POC Act Now

Path traversal in OpenEMR 7.0.4 disposeDocument() allows file access. PoC available.

PHP RCE Openemr
NVD GitHub
CVSS 3.1
9.9
EPSS
0.2%
CVE-2026-25147 HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 allow authenticated portal users to access other patients' protected health information through insecure direct object references (IDOR) in the payment portal, enabling horizontal privilege escalation to view and modify another patient's demographics, invoices, and payment history. The vulnerability stems from accepting patient ID values from user-controlled request parameters instead of validating against the authenticated user's session. Public exploit code exists for this vulnerability.

PHP Privilege Escalation Openemr
NVD GitHub
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-24488 MEDIUM POC PATCH This Month

OpenEMR versions up to 8.0.0 contain a path traversal vulnerability in the fax sending functionality that allows authenticated users to exfiltrate arbitrary files from the server, including database credentials, patient records, and source code. The fax endpoint fails to validate or restrict file paths, enabling attackers to read and transmit sensitive data to attacker-controlled phone numbers. Public exploit code exists for this vulnerability, and a patch is available.

Path Traversal Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-27943 MEDIUM POC PATCH This Month

Authenticated users in OpenEMR through version 8.0.0 can access and modify eye exam records belonging to other patients by manipulating form IDs, bypassing patient context validation. This allows disclosure or alteration of sensitive medical data across the patient database, and public exploit code exists for this vulnerability. A patch is available on the main branch of the OpenEMR repository.

Github Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25930 MEDIUM POC PATCH This Month

Openemr versions up to 8.0.0 is affected by authorization bypass through user-controlled key (CVSS 6.5).

Authentication Bypass Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25929 MEDIUM POC PATCH This Month

Openemr versions up to 8.0.0 is affected by authorization bypass through user-controlled key (CVSS 6.5).

Authentication Bypass Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25927 HIGH POC This Week

Openemr versions up to 8.0.0 is affected by authorization bypass through user-controlled key (CVSS 7.1).

Authentication Bypass Openemr
NVD GitHub
CVSS 3.1
7.1
EPSS
0.1%
CVE-2026-25746 HIGH POC PATCH This Week

SQL injection in OpenEMR versions before 8.0.0 allows authenticated users to execute arbitrary database queries through the prescription listing feature due to improper input validation. An attacker with valid credentials could exploit this to read, modify, or delete sensitive medical records and patient data. Public exploit code exists for this vulnerability; administrators should upgrade to version 8.0.0 immediately.

SQLi Openemr
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25743 MEDIUM POC PATCH This Month

Stored XSS in OpenEMR prior to version 8.0.0 allows authenticated users with "Forms administration" role to inject malicious JavaScript into patient encounter forms, which executes when other users with the same role view the affected data. Public exploit code exists for this vulnerability. The issue is resolved in version 8.0.0.

XSS Openemr
NVD GitHub
CVSS 3.1
4.8
EPSS
0.3%
CVE-2026-25476 HIGH POC PATCH This Week

OpenEMR prior to version 8.0.0 fails to enforce session expiration when the skip_timeout_reset parameter is present in requests, allowing expired sessions to remain active indefinitely. An attacker with a stolen session cookie can exploit this by continuously sending the skip_timeout_reset parameter to maintain unauthorized access to sensitive health records without being logged out. Public exploit code exists for this vulnerability with a CVSS score of 7.5.

PHP Openemr
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25220 MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 allow any authenticated user to view all internal messages and notes from other users by exploiting insufficient authorization checks on the Message Center's `show_all` parameter. The vulnerability exists because the application does not verify administrator privileges before returning the complete message list, enabling unauthorized disclosure of sensitive medical communications. Public exploit code exists for this medium-severity information disclosure vulnerability.

PHP Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25164 HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 fail to enforce API authorization checks on document and insurance endpoints, allowing any authenticated API client to read and modify all patient PHI regardless of assigned access controls. Public exploit code exists for this vulnerability, which affects healthcare organizations using OpenEMR's REST API. An attacker with valid API credentials can access sensitive medical records and insurance information across the entire patient database.

PHP Openemr
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-24908 CRITICAL POC PATCH Act Now

SQL injection in OpenEMR electronic health records before fix. Authenticated users can execute arbitrary SQL through the medical records system. PoC and patch available.

SQLi Openemr
NVD GitHub
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-24890 HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 contain an authorization bypass in the patient portal that allows authenticated users to forge provider signatures by uploading files with admin-signature type parameters for any provider. Public exploit code exists for this vulnerability, which could enable signature forgery on medical documents, creating legal and compliance risks. Upgrade to version 8.0.0 or later to remediate this high-severity flaw.

Authentication Bypass Openemr
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-24487 MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 contain an authorization bypass in the FHIR CareTeam endpoint that allows authenticated users with patient-scoped tokens to retrieve care team information for all patients rather than only their own, potentially exposing Protected Health Information across the entire system. The vulnerability exists because the service fails to enforce patient compartment filtering, and public exploit code is available. Security professionals should prioritize patching to version 8.0.0 or later to prevent unauthorized PHI disclosure.

Information Disclosure Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-23627 HIGH POC PATCH This Week

SQL injection in OpenEMR's Immunization module prior to version 8.0.0 enables authenticated users to execute arbitrary database queries through unparameterized patient_id inputs. This allows attackers to exfiltrate protected health information, steal credentials, and potentially achieve remote code execution with complete database compromise. Public exploit code exists for this vulnerability; organizations should upgrade to version 8.0.0 immediately.

RCE SQLi Openemr
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25135 MEDIUM PATCH This Month

OpenEMR versions prior to 8.0.0 expose complete contact details for all users, organizations, and patients to authenticated attackers with specific FHIR export and location read permissions. The vulnerability requires administrator-enabled OAuth2 confidential client access, limiting exploitation to high-trust server-to-server integrations with established relationships. This information disclosure affects OpenEMR deployments since 2023 and can be mitigated by upgrading to version 8.0.0 or later.

Information Disclosure Openemr
NVD GitHub
CVSS 3.1
4.5
EPSS
0.1%
CVE-2026-25131 HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 contain a broken access control flaw in the order types management system that allows low-privilege users (such as receptionists) to create and modify procedure types without proper authorization. Public exploit code exists for this vulnerability, which has a CVSS score of 8.8 and could enable unauthorized users to manipulate critical medical procedure data. The vulnerability has been patched in version 8.0.0 and later.

PHP Openemr
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25127 MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 fail to properly enforce permission checks, allowing authenticated users to access sensitive information belonging to other authorized users. The vulnerability requires valid credentials and network access but does not enable data modification or denial of service. Public exploit code exists and a patch is available in version 8.0.0 and later.

Authentication Bypass Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25124 MEDIUM POC PATCH This Month

OpenEMR prior to version 8.0.0 allows low-privileged users to export sensitive patient and medical data through the message_list.php report functionality due to missing access controls. The vulnerability affects receptionists and similar roles who can bypass authorization checks to extract entire message databases containing confidential information. Public exploit code exists for this issue, though a patch is available in version 8.0.0 and later.

PHP CSRF Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24896 MEDIUM POC PATCH This Month

OpenEMR versions before 8.0.0 contain an improper access control flaw in the edih_main.php endpoint that allows any authenticated user, including low-privilege accounts like Receptionists, to retrieve sensitive EDI log files by manipulating the log_select parameter. The vulnerability bypasses role-based access controls that should restrict access through the GUI, enabling unauthorized disclosure of system logs. Public exploit code exists for this issue, which is fixed in version 8.0.0.

PHP Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24849 CRITICAL POC PATCH Act Now

Path traversal in OpenEMR electronic health records before fix allows authenticated users to read arbitrary files on the server, potentially exposing patient health data. PoC and patch available.

PHP Openemr
NVD GitHub
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-24847 MEDIUM POC PATCH This Month

Openemr versions up to 8.0.0 is affected by url redirection to untrusted site (open redirect) (CVSS 6.1).

Open Redirect Openemr
NVD GitHub
CVSS 3.1
6.1
EPSS
0.1%
CVE-2026-21443 MEDIUM PATCH This Month

Cross-site scripting (XSS) in OpenEMR prior to version 8.0.0 allows unauthenticated attackers to inject malicious scripts through the translation database, as the `xl()` function returns unescaped strings that are used directly in the application without proper context-specific escaping. An attacker with database access could exploit this to execute arbitrary JavaScript in users' browsers and compromise sensitive patient data or application functionality. The vulnerability is resolved in OpenEMR 8.0.0 and later versions.

XSS Openemr
NVD GitHub
CVSS 3.1
6.1
EPSS
0.1%
CVE-2025-69231 HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. [CVSS 8.7 HIGH]

XSS Privilege Escalation Openemr
NVD GitHub
CVSS 3.1
8.7
EPSS
0.2%
CVE-2025-68277 MEDIUM POC PATCH This Month

Openemr versions up to 7.0.4 is affected by user interface (ui) misrepresentation of critical information (CVSS 5.0).

Information Disclosure Openemr
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-67752 HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. [CVSS 8.1 HIGH]

Authentication Bypass Openemr
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2025-67491 MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Versions 5.0.0.5 through 7.0.3.4 have a stored cross-site scripting vulnerability in the ub04 helper of the billing interface. [CVSS 5.4 MEDIUM]

XSS Openemr
NVD GitHub
CVSS 3.1
5.4
EPSS
0.2%
CVE-2025-67645 HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. [CVSS 8.8 HIGH]

Authentication Bypass Openemr
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-54373 MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a vulnerability where sensitive data is unintentionally revealed to unauthorized parties. [CVSS 6.5 MEDIUM]

Information Disclosure Openemr
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2021-47817 MEDIUM POC This Month

OpenEMR 5.0.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript through user profile parameters. [CVSS 5.4 MEDIUM]

XSS Openemr
NVD Exploit-DB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-43860 HIGH POC This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVSS 3.1
7.6
EPSS
0.9%
CVE-2025-32967 MEDIUM POC This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Openemr
NVD GitHub
CVSS 3.1
5.4
EPSS
0.7%
CVE-2025-32794 HIGH POC This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVSS 3.1
7.6
EPSS
0.7%
CVE-2024-22611 CRITICAL POC Act Now

OpenEMR 7.0.2 is vulnerable to SQL Injection via \openemr\library\classes\Pharmacy.class.php, \controllers\C_Pharmacy.class.php and \openemr\controller.php. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

PHP SQLi Openemr
NVD GitHub
CVSS 3.1
9.8
EPSS
0.0%
CVE-2025-31121 HIGH POC This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.0), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVSS 4.0
7.0
EPSS
1.2%
CVE-2025-31117 MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

SSRF Openemr
NVD GitHub
CVSS 4.0
6.9
EPSS
1.0%
CVE-2025-30161 HIGH POC This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVSS 4.0
8.4
EPSS
0.5%
CVE-2025-30149 MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable. Public exploit code available.

PHP XSS Openemr
NVD GitHub
CVSS 3.1
6.4
EPSS
0.7%
CVE-2025-29772 HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable. Public exploit code available.

PHP XSS Openemr
NVD GitHub
CVSS 4.0
7.2
EPSS
0.7%
CVE-2025-29789 MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 4.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Path Traversal Openemr
NVD GitHub
CVSS 4.0
4.6
EPSS
0.2%
CVE-2026-34056
EPSS 0% CVSS 7.7
HIGH This Week

Low-privilege authenticated users in OpenEMR versions up to and including 8.0.0.3 can view and download Ensora eRx error logs due to missing authorization checks, exposing sensitive healthcare system information. This broken access control vulnerability (CVSS 7.7) affects network-accessible installations and has a 3% EPSS exploitation probability (8th percentile), with no public exploit identified at time of analysis. No vendor-released patch identified at time of analysis according to the CVE disclosure.

Information Disclosure Openemr
NVD GitHub
CVE-2026-33931
EPSS 0% CVSS 6.5
MEDIUM This Month

OpenEMR portal payment pages prior to version 8.0.0.3 expose other patients' protected health information (PHI) and payment card metadata through an Insecure Direct Object Reference vulnerability. Authenticated portal patients can manipulate the `recid` query parameter in `portal/portal_payment.php` to access arbitrary patient payment records and billing data without authorization. The vulnerability affects all versions before 8.0.0.3 and carries a CVSS score of 6.5 (high confidentiality impact); however, the 0.03% EPSS score indicates low real-world exploitation probability, and no public exploit code or active exploitation has been identified.

Openemr PHP Information Disclosure
NVD GitHub VulDB
CVE-2026-33918
EPSS 0% CVSS 7.6
HIGH This Week

Improper access control in OpenEMR versions prior to 8.0.0.3 allows any authenticated user to download and permanently delete electronic claim batch files containing protected health information (PHI) via the billing file-download endpoint, regardless of whether they have billing privileges. The vulnerability has a 7.6 CVSS score with low attack complexity and requires only low-level authentication. EPSS exploitation probability is 0.03% (8th percentile), indicating low observed targeting in real-world exploitation at time of analysis, and no public exploit has been identified.

Openemr PHP Privilege Escalation +1
NVD GitHub VulDB
CVE-2026-33917
EPSS 0% CVSS 8.8
HIGH This Week

SQL injection in OpenEMR versions prior to 8.0.0.3 enables authenticated attackers to execute arbitrary SQL commands through the CAMOS form's ajax_save functionality, potentially leading to complete database compromise including extraction of sensitive health records, data modification, and service disruption. The vulnerability requires low-privilege authentication (PR:L) with no user interaction (UI:N) and is network-exploitable (AV:N), though EPSS assigns only 0.03% (8th percentile) exploitation probability and no public exploit identified at time of analysis. Vendor-released patch available in version 8.0.0.3.

Openemr SQLi PHP
NVD GitHub VulDB
CVE-2026-33915
EPSS 0% CVSS 5.4
MEDIUM This Month

OpenEMR versions prior to 8.0.0.3 allow authenticated API users to bypass administrative access controls on five insurance company management REST API endpoints due to missing authorization checks. An attacker with valid API credentials but non-administrative OpenEMR privileges can create, read, and modify insurance company records without proper permission validation. The vulnerability requires prior authentication and affects data integrity rather than confidentiality or availability; no public exploit code has been identified, and exploitation probability is very low (EPSS 0.02%).

Openemr Privilege Escalation Authentication Bypass
NVD GitHub VulDB
CVE-2026-32127
EPSS 0% CVSS 8.8
HIGH This Week

OpenEMR versions prior to 8.0.0.1 contain a SQL injection vulnerability in the ajax graphs library that allows authenticated users to execute arbitrary database queries, potentially leading to complete compromise of patient health records and system data. The vulnerability stems from insufficient input validation and requires valid credentials to exploit, but poses a critical risk given the sensitive nature of healthcare data stored in OpenEMR systems. No patch is currently available for affected versions.

SQLi Openemr
NVD GitHub VulDB
CVE-2026-32126
EPSS 0% CVSS 7.1
HIGH This Week

OpenEMR versions prior to 8.0.0.1 contain an inverted boolean condition in the access control logic that allows any authenticated user to access administrative CDR controllers (alerts, ajax, edit, add, detail, browse) intended for administrators only. Affected users can suppress clinical decision support alerts, delete or modify clinical plans, and edit rule configurations without proper authorization. No patch is currently available for this high-severity vulnerability.

Authentication Bypass Openemr
NVD GitHub VulDB
CVE-2026-32125
EPSS 0% CVSS 5.4
MEDIUM This Month

Stored cross-site scripting in OpenEMR versions prior to 8.0.0.1 allows authenticated users with Track Anything feature access to inject malicious scripts into item names that execute in the browsers of all users viewing the corresponding Dygraph charts. An attacker with create or edit permissions can craft payloads that run in victims' sessions without their knowledge, potentially enabling session hijacking or unauthorized actions within the application. No patch is currently available for affected versions.

XSS Openemr
NVD GitHub VulDB
CVE-2026-32124
EPSS 0% CVSS 5.4
MEDIUM This Month

Stored cross-site scripting (XSS) in OpenEMR prior to 8.0.0.1 allows administrators or users with code management privileges to inject malicious scripts into code descriptions that execute in the browsers of all users accessing the dynamic code picker. All OpenEMR instances running affected versions are at risk, as any authenticated admin can inject payloads affecting the entire user base. No patch is currently available for this vulnerability.

XSS Openemr
NVD GitHub VulDB
CVE-2026-32123
EPSS 0% CVSS 7.7
HIGH This Week

OpenEMR versions prior to 8.0.0.1 fail to properly enforce access controls on group encounters due to sensitivity checks only querying the wrong database table, allowing authenticated users to view restricted medical records such as mental health encounters they should not access. The vulnerability affects multi-user deployments where role-based restrictions are relied upon to protect sensitive patient information. No patch is currently available for affected versions.

Authentication Bypass Openemr
NVD GitHub VulDB
CVE-2026-32122
EPSS 0% CVSS 4.3
MEDIUM This Month

OpenEMR versions prior to 8.0.0.1 fail to properly enforce access controls on the Claim File Tracker AJAX endpoint, allowing authenticated users without billing permissions to retrieve sensitive claim metadata including claim IDs, payer information, and transmission logs. An authenticated attacker with minimal privileges can access confidential billing information that should be restricted to authorized billing staff. No patch is currently available for affected installations.

Authentication Bypass Openemr
NVD GitHub VulDB
CVE-2026-32121
EPSS 0% CVSS 7.7
HIGH This Week

Stored DOM-based cross-site scripting (XSS) in OpenEMR prior to version 8.0.0.1 allows authenticated attackers with low privileges to inject malicious scripts through unsanitized patient names in the portal signing component, which are rendered client-side via jQuery. Successful exploitation requires user interaction and could enable attackers to perform actions in the context of affected users or steal sensitive health information. A patch is available in OpenEMR 8.0.0.1 and later versions.

PHP XSS Openemr
NVD GitHub VulDB
CVE-2026-32118
EPSS 0% CVSS 5.4
MEDIUM This Month

Stored XSS in OpenEMR's Pain Map form prior to version 8.0.0.1 allows authenticated users to inject malicious JavaScript into encounter records that executes when other clinicians view the affected form. Since session cookies lack HttpOnly protection, attackers can hijack sessions of other users including administrators. This vulnerability requires user interaction and network access but poses significant risk in multi-user healthcare environments.

XSS Openemr
NVD GitHub VulDB
CVE-2026-25146
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

Information disclosure in OpenEMR 5.0.2 to before 8.0.0 exposes sensitive data. PoC and patch available.

Information Disclosure Openemr
NVD GitHub
CVE-2026-24898
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Unauthenticated token disclosure in OpenEMR before 8.0.0. CVSS 10.0. PoC and patch available.

Authentication Bypass Information Disclosure PHP +1
NVD GitHub
CVE-2026-24848
EPSS 0% CVSS 9.9
CRITICAL POC Act Now

Path traversal in OpenEMR 7.0.4 disposeDocument() allows file access. PoC available.

PHP RCE Openemr
NVD GitHub
CVE-2026-25147
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 allow authenticated portal users to access other patients' protected health information through insecure direct object references (IDOR) in the payment portal, enabling horizontal privilege escalation to view and modify another patient's demographics, invoices, and payment history. The vulnerability stems from accepting patient ID values from user-controlled request parameters instead of validating against the authenticated user's session. Public exploit code exists for this vulnerability.

PHP Privilege Escalation Openemr
NVD GitHub
CVE-2026-24488
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR versions up to 8.0.0 contain a path traversal vulnerability in the fax sending functionality that allows authenticated users to exfiltrate arbitrary files from the server, including database credentials, patient records, and source code. The fax endpoint fails to validate or restrict file paths, enabling attackers to read and transmit sensitive data to attacker-controlled phone numbers. Public exploit code exists for this vulnerability, and a patch is available.

Path Traversal Openemr
NVD GitHub
CVE-2026-27943
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Authenticated users in OpenEMR through version 8.0.0 can access and modify eye exam records belonging to other patients by manipulating form IDs, bypassing patient context validation. This allows disclosure or alteration of sensitive medical data across the patient database, and public exploit code exists for this vulnerability. A patch is available on the main branch of the OpenEMR repository.

Github Openemr
NVD GitHub
CVE-2026-25930
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Openemr versions up to 8.0.0 is affected by authorization bypass through user-controlled key (CVSS 6.5).

Authentication Bypass Openemr
NVD GitHub
CVE-2026-25929
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Openemr versions up to 8.0.0 is affected by authorization bypass through user-controlled key (CVSS 6.5).

Authentication Bypass Openemr
NVD GitHub
CVE-2026-25927
EPSS 0% CVSS 7.1
HIGH POC This Week

Openemr versions up to 8.0.0 is affected by authorization bypass through user-controlled key (CVSS 7.1).

Authentication Bypass Openemr
NVD GitHub
CVE-2026-25746
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

SQL injection in OpenEMR versions before 8.0.0 allows authenticated users to execute arbitrary database queries through the prescription listing feature due to improper input validation. An attacker with valid credentials could exploit this to read, modify, or delete sensitive medical records and patient data. Public exploit code exists for this vulnerability; administrators should upgrade to version 8.0.0 immediately.

SQLi Openemr
NVD GitHub
CVE-2026-25743
EPSS 0% CVSS 4.8
MEDIUM POC PATCH This Month

Stored XSS in OpenEMR prior to version 8.0.0 allows authenticated users with "Forms administration" role to inject malicious JavaScript into patient encounter forms, which executes when other users with the same role view the affected data. Public exploit code exists for this vulnerability. The issue is resolved in version 8.0.0.

XSS Openemr
NVD GitHub
CVE-2026-25476
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

OpenEMR prior to version 8.0.0 fails to enforce session expiration when the skip_timeout_reset parameter is present in requests, allowing expired sessions to remain active indefinitely. An attacker with a stolen session cookie can exploit this by continuously sending the skip_timeout_reset parameter to maintain unauthorized access to sensitive health records without being logged out. Public exploit code exists for this vulnerability with a CVSS score of 7.5.

PHP Openemr
NVD GitHub
CVE-2026-25220
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 allow any authenticated user to view all internal messages and notes from other users by exploiting insufficient authorization checks on the Message Center's `show_all` parameter. The vulnerability exists because the application does not verify administrator privileges before returning the complete message list, enabling unauthorized disclosure of sensitive medical communications. Public exploit code exists for this medium-severity information disclosure vulnerability.

PHP Openemr
NVD GitHub
CVE-2026-25164
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 fail to enforce API authorization checks on document and insurance endpoints, allowing any authenticated API client to read and modify all patient PHI regardless of assigned access controls. Public exploit code exists for this vulnerability, which affects healthcare organizations using OpenEMR's REST API. An attacker with valid API credentials can access sensitive medical records and insurance information across the entire patient database.

PHP Openemr
NVD GitHub
CVE-2026-24908
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

SQL injection in OpenEMR electronic health records before fix. Authenticated users can execute arbitrary SQL through the medical records system. PoC and patch available.

SQLi Openemr
NVD GitHub
CVE-2026-24890
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 contain an authorization bypass in the patient portal that allows authenticated users to forge provider signatures by uploading files with admin-signature type parameters for any provider. Public exploit code exists for this vulnerability, which could enable signature forgery on medical documents, creating legal and compliance risks. Upgrade to version 8.0.0 or later to remediate this high-severity flaw.

Authentication Bypass Openemr
NVD GitHub
CVE-2026-24487
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 contain an authorization bypass in the FHIR CareTeam endpoint that allows authenticated users with patient-scoped tokens to retrieve care team information for all patients rather than only their own, potentially exposing Protected Health Information across the entire system. The vulnerability exists because the service fails to enforce patient compartment filtering, and public exploit code is available. Security professionals should prioritize patching to version 8.0.0 or later to prevent unauthorized PHI disclosure.

Information Disclosure Openemr
NVD GitHub
CVE-2026-23627
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

SQL injection in OpenEMR's Immunization module prior to version 8.0.0 enables authenticated users to execute arbitrary database queries through unparameterized patient_id inputs. This allows attackers to exfiltrate protected health information, steal credentials, and potentially achieve remote code execution with complete database compromise. Public exploit code exists for this vulnerability; organizations should upgrade to version 8.0.0 immediately.

RCE SQLi Openemr
NVD GitHub
CVE-2026-25135
EPSS 0% CVSS 4.5
MEDIUM PATCH This Month

OpenEMR versions prior to 8.0.0 expose complete contact details for all users, organizations, and patients to authenticated attackers with specific FHIR export and location read permissions. The vulnerability requires administrator-enabled OAuth2 confidential client access, limiting exploitation to high-trust server-to-server integrations with established relationships. This information disclosure affects OpenEMR deployments since 2023 and can be mitigated by upgrading to version 8.0.0 or later.

Information Disclosure Openemr
NVD GitHub
CVE-2026-25131
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

OpenEMR versions prior to 8.0.0 contain a broken access control flaw in the order types management system that allows low-privilege users (such as receptionists) to create and modify procedure types without proper authorization. Public exploit code exists for this vulnerability, which has a CVSS score of 8.8 and could enable unauthorized users to manipulate critical medical procedure data. The vulnerability has been patched in version 8.0.0 and later.

PHP Openemr
NVD GitHub
CVE-2026-25127
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR versions prior to 8.0.0 fail to properly enforce permission checks, allowing authenticated users to access sensitive information belonging to other authorized users. The vulnerability requires valid credentials and network access but does not enable data modification or denial of service. Public exploit code exists and a patch is available in version 8.0.0 and later.

Authentication Bypass Openemr
NVD GitHub
CVE-2026-25124
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR prior to version 8.0.0 allows low-privileged users to export sensitive patient and medical data through the message_list.php report functionality due to missing access controls. The vulnerability affects receptionists and similar roles who can bypass authorization checks to extract entire message databases containing confidential information. Public exploit code exists for this issue, though a patch is available in version 8.0.0 and later.

PHP CSRF Openemr
NVD GitHub
CVE-2026-24896
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR versions before 8.0.0 contain an improper access control flaw in the edih_main.php endpoint that allows any authenticated user, including low-privilege accounts like Receptionists, to retrieve sensitive EDI log files by manipulating the log_select parameter. The vulnerability bypasses role-based access controls that should restrict access through the GUI, enabling unauthorized disclosure of system logs. Public exploit code exists for this issue, which is fixed in version 8.0.0.

PHP Openemr
NVD GitHub
CVE-2026-24849
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

Path traversal in OpenEMR electronic health records before fix allows authenticated users to read arbitrary files on the server, potentially exposing patient health data. PoC and patch available.

PHP Openemr
NVD GitHub
CVE-2026-24847
EPSS 0% CVSS 6.1
MEDIUM POC PATCH This Month

Openemr versions up to 8.0.0 is affected by url redirection to untrusted site (open redirect) (CVSS 6.1).

Open Redirect Openemr
NVD GitHub
CVE-2026-21443
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

Cross-site scripting (XSS) in OpenEMR prior to version 8.0.0 allows unauthenticated attackers to inject malicious scripts through the translation database, as the `xl()` function returns unescaped strings that are used directly in the application without proper context-specific escaping. An attacker with database access could exploit this to execute arbitrary JavaScript in users' browsers and compromise sensitive patient data or application functionality. The vulnerability is resolved in OpenEMR 8.0.0 and later versions.

XSS Openemr
NVD GitHub
CVE-2025-69231
EPSS 0% CVSS 8.7
HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. [CVSS 8.7 HIGH]

XSS Privilege Escalation Openemr
NVD GitHub
CVE-2025-68277
EPSS 0% CVSS 5.0
MEDIUM POC PATCH This Month

Openemr versions up to 7.0.4 is affected by user interface (ui) misrepresentation of critical information (CVSS 5.0).

Information Disclosure Openemr
NVD GitHub
CVE-2025-67752
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. [CVSS 8.1 HIGH]

Authentication Bypass Openemr
NVD GitHub
CVE-2025-67491
EPSS 0% CVSS 5.4
MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Versions 5.0.0.5 through 7.0.3.4 have a stored cross-site scripting vulnerability in the ub04 helper of the billing interface. [CVSS 5.4 MEDIUM]

XSS Openemr
NVD GitHub
CVE-2025-67645
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. [CVSS 8.8 HIGH]

Authentication Bypass Openemr
NVD GitHub
CVE-2025-54373
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a vulnerability where sensitive data is unintentionally revealed to unauthorized parties. [CVSS 6.5 MEDIUM]

Information Disclosure Openemr
NVD GitHub
CVE-2021-47817
EPSS 0% CVSS 5.4
MEDIUM POC This Month

OpenEMR 5.0.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript through user profile parameters. [CVSS 5.4 MEDIUM]

XSS Openemr
NVD Exploit-DB
CVE-2025-43860
EPSS 1% CVSS 7.6
HIGH POC This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVE-2025-32967
EPSS 1% CVSS 5.4
MEDIUM POC This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Openemr
NVD GitHub
CVE-2025-32794
EPSS 1% CVSS 7.6
HIGH POC This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVE-2024-22611
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

OpenEMR 7.0.2 is vulnerable to SQL Injection via \openemr\library\classes\Pharmacy.class.php, \controllers\C_Pharmacy.class.php and \openemr\controller.php. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

PHP SQLi Openemr
NVD GitHub
CVE-2025-31121
EPSS 1% CVSS 7.0
HIGH POC This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.0), this vulnerability is remotely exploitable. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVE-2025-31117
EPSS 1% CVSS 6.9
MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 6.9), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

SSRF Openemr
NVD GitHub
CVE-2025-30161
EPSS 1% CVSS 8.4
HIGH POC This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 8.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Openemr
NVD GitHub
CVE-2025-30149
EPSS 1% CVSS 6.4
MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable. Public exploit code available.

PHP XSS Openemr
NVD GitHub
CVE-2025-29772
EPSS 1% CVSS 7.2
HIGH POC PATCH This Week

OpenEMR is a free and open source electronic health records and medical practice management application. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable. Public exploit code available.

PHP XSS Openemr
NVD GitHub
CVE-2025-29789
EPSS 0% CVSS 4.6
MEDIUM POC PATCH This Month

OpenEMR is a free and open source electronic health records and medical practice management application. Rated medium severity (CVSS 4.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Path Traversal Openemr
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy