open-emr CVE Vulnerabilities & Metrics

Focus on open-emr vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About open-emr Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with open-emr. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total open-emr CVEs: 168
Earliest CVE date: 09 Sep 2012, 21:55 UTC
Latest CVE date: 03 Mar 2026, 22:16 UTC

Latest CVE reference: CVE-2026-25146

Rolling Stats

30-day Count (Rolling): 30
365-day Count (Rolling): 44

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 900.0%
Year Variation (Calendar): 2100.0%

Month Growth Rate (30-day Rolling): 900.0%
Year Growth Rate (365-day Rolling): 2100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical open-emr CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.09

Max CVSS: 9.0

Critical CVEs (≥9): 4

CVSS Range vs. Count

Range Count
0.0-3.9 92
4.0-6.9 71
7.0-8.9 8
9.0-10.0 4

CVSS Distribution Chart

Top 5 Highest CVSS open-emr CVEs

These are the five CVEs with the highest CVSS scores for open-emr, sorted by severity first and recency.

All CVEs for open-emr

CVE-2026-25146 open-emr vulnerability CVSS: 0 03 Mar 2026, 22:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. From 5.0.2 to before 8.0.0, there are (at least) two paths where the gateway_api_key secret value is rendered to the client in plaintext. These secret keys being leaked could result in arbitrary money movement or broad account takeover of payment gateway APIs. This vulnerability is fixed in 8.0.0.

CVE-2026-24898 open-emr vulnerability CVSS: 0 03 Mar 2026, 22:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0, an unauthenticated token disclosure vulnerability in the MedEx callback endpoint allows any unauthenticated visitor to obtain the practice's MedEx API tokens, leading to complete third-party service compromise, PHI exfiltration, unauthorized actions on the MedEx platform, and HIPAA violations. The vulnerability exists because the endpoint bypasses authentication ($ignoreAuth = true) and performs a MedEx login whenever $_POST['callback_key'] is provided, returning the full JSON response including sensitive API tokens. This vulnerability is fixed in 8.0.0.

CVE-2026-24848 open-emr vulnerability CVSS: 0 03 Mar 2026, 22:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells.

CVE-2026-25147 open-emr vulnerability CVSS: 0 27 Feb 2026, 17:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, in `portal/portal_payment.php`, the patient id used for the page is taken from the request (`$pid = $_REQUEST['pid'] ?? $pid` and `$pid = ($_REQUEST['hidden_patient_code'] ?? null) > 0 ? $_REQUEST['hidden_patient_code'] : $pid`) instead of being fixed to the authenticated portal user. The portal session already has a valid `$pid` for the logged-in patient. Overwriting it with user-supplied values and using it without authorization allows a portal user to view and interact with another patient's demographics, invoices, and payment history—horizontal privilege escalation and IDOR. Version 8.0.0 contains a fix for the issue.

CVE-2026-24488 open-emr vulnerability CVSS: 0 27 Feb 2026, 17:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, an arbitrary file exfiltration vulnerability in the fax sending endpoint allows any authenticated user to read and transmit any file on the server (including database credentials, patient documents, system files, and source code) via fax to an attacker-controlled phone number. The vulnerability exists because the endpoint accepts arbitrary file paths from user input and streams them to the fax gateway without path restrictions or authorization checks. As of time of publication, no known patched versions are available.

CVE-2026-27943 open-emr vulnerability CVSS: 0 26 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the eye exam (eye_mag) view loads data by `form_id` (or equivalent) without verifying that the form belongs to the current user’s patient/encounter context. An authenticated user can access or edit any patient’s eye exam by supplying another form ID; in some flows the session’s active patient may also be switched. A fix is available on the `main` branch of the OpenEMR GitHub repository.

CVE-2026-25930 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the Layout-Based Form (LBF) printable view accepts `formid` and `visitid` (or `patientid`) from the request and does not verify that the form belongs to the current user’s authorized patient/encounter. An authenticated user with LBF access can enumerate form IDs and view or print any patient’s encounter forms. Version 8.0.0 fixes the issue.

CVE-2026-25929 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the document controller’s `patient_picture` context serves the patient’s photo by document ID or patient ID without verifying that the current user is authorized to access that patient. An authenticated user with document ACL can supply another patient’s ID and retrieve their photo. Version 8.0.0 fixes the issue.

CVE-2026-25927 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the DICOM viewer state API (e.g. upload or state save/load) accepts a document ID (`doc_id`) without verifying that the document belongs to the current user’s authorized patient or encounter. An authenticated user can read or modify DICOM viewer state (e.g. annotations, view settings) for any document by enumerating document IDs. Version 8.0.0 fixes the issue.

CVE-2026-25746 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0 contain a SQL injection vulnerability in prescription that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the prescription listing functionality. Version 8.0.0 fixes the vulnerability.

CVE-2026-25743 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, users with the "Forms administration" role can fill questionnaires ("forms") in patient encounters. The answers to the forms are displayed on the encounter page and in the visit history for the users with the same role. There exists a stored cross-site scripting (XSS) vulnerability in the function to display the form answers, allowing any authenticated attacker with the specific role to insert arbitrary JavaScript into the system by entering malicious payloads to the form answers. The JavaScript code is later executed by any user with the form role when viewing the form answers in the patient encounter pages or visit history. Version 8.0.0 fixes the issue.

CVE-2026-25476 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiration check in `library/auth.inc.php` runs only when `skip_timeout_reset` is not present in the request. When `skip_timeout_reset=1` is sent, the entire block that calls `SessionTracker::isSessionExpired()` and forces logout on timeout is skipped. As a result, any request that includes this parameter (e.g. from auto-refresh pages like the Patient Flow Board) never runs the expiration check: expired sessions can continue to access data indefinitely, abandoned workstations stay active, and an attacker with a stolen session cookie can keep sending `skip_timeout_reset=1` to avoid being logged out. Version 8.0.0 fixes the issue.

CVE-2026-25220 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the Message Center accepts the URL parameter `show_all=yes` and passes it to `getPnotesByUser()`, which returns all internal messages (all users’ notes). The backend does not verify that the requesting user is an administrator before honoring `show_all=yes`. The "Show All" link is also visible to non-admin users. As a result, any authenticated user can view the entire internal message list by requesting `messages.php?show_all=yes`. Version 8.0.0 patches the issue.

CVE-2026-25164 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the REST API route table in `apis/routes/_rest_routes_standard.inc.php` does not call `RestConfig::request_authorization_check()` for the document and insurance routes. Other patient routes in the same file (e.g. encounters, patients/med) call it with the appropriate ACL. As a result, any valid API bearer token can access or modify every patient's documents and insurance data, regardless of the token’s OpenEMR ACLs—effectively exposing all document and insurance PHI to any authenticated API client. Version 8.0.0 patches the issue.

CVE-2026-24908 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an SQL injection vulnerability in the Patient REST API endpoint allows authenticated users with API access to execute arbitrary SQL queries through the `_sort` parameter. This could potentially lead to database access, PHI (Protected Health Information) exposure, and credential compromise. The issue occurs when user-supplied sort field names are used in ORDER BY clauses without proper validation or identifier escaping. Version 8.0.0 fixes the issue.

CVE-2026-24890 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an authorization bypass vulnerability in the patient portal signature endpoint allows authenticated portal users to upload and overwrite provider signatures by setting `type=admin-signature` and specifying any provider user ID. This could potentially lead to signature forgery on medical documents, legal compliance violations, and fraud. The issue occurs when portal users are allowed to modify provider signatures without proper authorization checks. Version 8.0.0 fixes the issue.

CVE-2026-24487 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an authorization bypass vulnerability in the FHIR CareTeam resource endpoint allows patient-scoped FHIR tokens to access care team data for all patients instead of being restricted to only the authenticated patient's data. This could potentially lead to unauthorized disclosure of Protected Health Information (PHI), including patient-provider relationships and care team structures across the entire system. The issue occurs because the `FhirCareTeamService` does not implement the `IPatientCompartmentResourceService` interface and does not pass the patient binding parameter to the underlying service, bypassing the patient compartment filtering mechanism. Version 8.0.0 contains a patch for this issue.

CVE-2026-23627 open-emr vulnerability CVSS: 0 25 Feb 2026, 19:43 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an SQL injection vulnerability in the Immunization module allows any authenticated user to execute arbitrary SQL queries, leading to complete database compromise, PHI exfiltration, credential theft, and potential remote code execution. The vulnerability exists because user-supplied `patient_id` values are directly concatenated into SQL WHERE clauses without parameterization or escaping. Version 8.0.0 patches the issue.

CVE-2026-25135 open-emr vulnerability CVSS: 0 25 Feb 2026, 03:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0 have an information disclosure vulnerability that leaks the entire contact information for all users, organizations, and patients in the system to anyone who has the system/(Group,Patient,*).$export operation and system/Location.read capabilities. This vulnerability will impact OpenEMR versions since 2023. This disclosure will only occur in extremely high trust environments as it requires using a confidential client with secure key exchange that requires an administrator to enable and grant permission before the app can even be used. This will typically only occur in server-server communication across trusted clients that already have established legal agreements. Version 8.0.0 contains a patch. As a workaround, disable clients that have the vulnerable scopes and only allow clients that do not have the system/Location.read scope until a fix has been deployed.

CVE-2026-25131 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in the OpenEMR order types management system, allowing low-privilege users (such as Receptionist) to add and modify procedure types without proper authorization. This vulnerability is present in the /openemr/interface/orders/types_edit.php endpoint. Version 8.0.0 contains a patch.

CVE-2026-25127 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the server does not properly validate user permission. Unauthorized users can view the information of authorized users. Version 8.0.0 fixes the issue.

CVE-2026-25124 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the OpenEMR application is vulnerable to an access control flaw that allows low-privileged users, such as receptionists, to export the entire message list containing sensitive patient and user data. The vulnerability lies in the message_list.php report export functionality, where there is no permission check before executing sensitive database queries. The only control in place is CSRF token verification, which does not prevent unauthorized data access if the token is acquired through other means. Version 8.0.0 fixes the vulnerability.

CVE-2026-24896 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in OpenEMR’s edih_main.php endpoint, which allows any authenticated user—including low-privilege roles like Receptionist—to access EDI log files by manipulating the log_select parameter in a GET request. The back-end fails to enforce role-based access control (RBAC), allowing sensitive system logs to be accessed outside the GUI-enforced permission boundaries. Version 8.0.0 fixes the issue.

CVE-2026-24849 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from the server filesystem. Any authenticated user (regardless of privilege level) can exploit this vulnerability to read sensitive files. Version 7.0.4 patches the issue.

CVE-2026-24847 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the Eye Exam form module allows any authenticated user to be redirected to an arbitrary external URL. This can be exploited for phishing attacks against healthcare providers using OpenEMR. Version 8.0.0 fixes the issue.

CVE-2026-21443 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the `xl()` translation function returns unescaped strings. While wrapper functions exist for escaping in different contexts (`xlt()` for HTML, `xla()` for attributes, `xlj()` for JavaScript), there are places in the codebase where `xl()` output is used directly without escaping. If an attacker could insert malicious content into the translation database, these unescaped outputs could lead to XSS. Version 8.0.0 fixes the issue.

CVE-2025-69231 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clinician privileges to inject malicious JavaScript that executes when other users view the form. This enables session hijacking, account takeover, and privilege escalation from clinician to administrator. Version 8.0.0 fixes the issue.

CVE-2025-68277 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, when a link is sent via Secure Messaging, clicking the link opens the website within the OpenEMR/Portal site. This behavior could be exploited for phishing. Version 7.0.4 patches the issue.

CVE-2025-67752 open-emr vulnerability CVSS: 0 25 Feb 2026, 02:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, OpenEMR's HTTP client wrapper (`oeHttp`/`oeHttpRequest`) disables SSL/TLS certificate verification by default (`verify: false`), making all external HTTPS connections vulnerable to man-in-the-middle (MITM) attacks. This affects communication with government healthcare APIs and user-configurable external services, potentially exposing Protected Health Information (PHI). Version 7.0.4 fixes the issue.

CVE-2025-67491 open-emr vulnerability CVSS: 0 25 Feb 2026, 01:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Versions 5.0.0.5 through 7.0.3.4 have a stored cross-site scripting vulnerability in the ub04 helper of the billing interface. The variable `$data` is passed in a click event handler enclosed in single quotes without proper sanitization. Thus, despite `json_encode` a malicious user can still inject a payload such as ` ac' ><img src=x onerror=alert(document.cookie)> ` to trigger the bug. This vulnerability allows low privileged users to embed malicious JS payloads on the server and perform stored XSS attack. This, in turn makes it possible for malicious users to steal the session cookies and perform unauthorized actions impersonating administrators. Version 7.0.4 patches the issue.

CVE-2025-67645 open-emr vulnerability CVSS: 0 28 Jan 2026, 00:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request parameters (pubpid / pid) to reference another user’s record; the server accepts the modified IDs and applies the changes to that other user’s profile. This allows one user to alter another user’s profile data (name, contact info, etc.), and could enable account takeover. Version 7.0.4 fixes the issue.

CVE-2025-54373 open-emr vulnerability CVSS: 0 28 Jan 2026, 00:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a vulnerability where sensitive data is unintentionally revealed to unauthorized parties. Contents of Clinical Notes and Care Plan, where an encounter has Sensitivity=high, can be viewed and changed by users who do not have Sensitivities=high privilege. Version 7.0.4 fixes the issue.

CVE-2021-47817 open-emr vulnerability CVSS: 0 21 Jan 2026, 18:16 UTC

OpenEMR 5.0.2.1 contains a cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript through user profile parameters. Attackers can exploit the vulnerability by crafting a malicious payload to download and execute a web shell, enabling remote command execution on the vulnerable OpenEMR instance.

CVE-2013-10044 open-emr vulnerability CVSS: 0 01 Aug 2025, 21:15 UTC

An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.

CVE-2025-43860 open-emr vulnerability CVSS: 0 23 May 2025, 16:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation and editing privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the (1) Text Box fields of Address, Address Line 2, Postal Code and City fields and (2) Drop Down menu options of Address Use, State and Country of the Additional Addresses section of the Contact tab in Patient Demographics. The injected script can execute in two scenarios: (1) dynamically during form input, and (2) when the form data is later loaded for editing. Version 7.0.3.4 contains a patch for the issue.

CVE-2025-32967 open-emr vulnerability CVSS: 0 23 May 2025, 16:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. A logging oversight in versions prior to 7.0.3.4 allows password change events to go unrecorded on the client-side log viewer, preventing administrators from auditing critical actions. This weakens traceability and opens the system to undetectable misuse by insiders or attackers. Version 7.0.3.4 contains a patch for the issue.

CVE-2025-32794 open-emr vulnerability CVSS: 0 23 May 2025, 16:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient's encounter under Orders → Procedure Orders. Version 7.0.3.4 contains a patch for the issue.

CVE-2024-22611 open-emr vulnerability CVSS: 0 03 Apr 2025, 19:15 UTC

OpenEMR 7.0.2 is vulnerable to SQL Injection via \openemr\library\classes\Pharmacy.class.php, \controllers\C_Pharmacy.class.php and \openemr\controller.php.

CVE-2025-31121 open-emr vulnerability CVSS: 0 01 Apr 2025, 15:16 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 7.0.3.1, the Patient Image feature in OpenEMR is vulnerable to cross-site scripting attacks via the EXIF title in an image. This vulnerability is fixed in 7.0.3.1.

CVE-2025-31117 open-emr vulnerability CVSS: 0 31 Mar 2025, 17:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in OpenEMR, allowing an attacker to force the server to make unauthorized requests to external or internal resources. this attack does not return a direct response but can be exploited through DNS or HTTP interactions to exfiltrate sensitive information. This vulnerability is fixed in 7.0.3.1.

CVE-2025-30161 open-emr vulnerability CVSS: 0 31 Mar 2025, 16:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. A stored XSS vulnerability in the Bronchitis form component of OpenEMR allows anyone who is able to edit a bronchitis form to steal credentials from administrators. This vulnerability is fixed in 7.0.3.

CVE-2025-30149 open-emr vulnerability CVSS: 0 31 Mar 2025, 16:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. OpenEMR allows reflected cross-site scripting (XSS) in the AJAX Script interface\super\layout_listitems_ajax.php via the target parameter. This vulnerability is fixed in 7.0.3.

CVE-2025-29772 open-emr vulnerability CVSS: 0 31 Mar 2025, 16:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. The POST parameter hidden_subcategory is output to the page without being properly processed. This leads to a reflected cross-site scripting (XSS) vul;nerability in CAMOS new.php. This vulnerability is fixed in 7.0.3.

CVE-2025-29789 open-emr vulnerability CVSS: 0 25 Mar 2025, 21:15 UTC

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.3.0 are vulnerable to Directory Traversal in the Load Code feature. Version 7.3.0 contains a patch for the issue.

CVE-2024-0875 open-emr vulnerability CVSS: 0 15 Nov 2024, 11:15 UTC

A stored cross-site scripting (XSS) vulnerability exists in openemr/openemr version 7.0.1. An attacker can inject malicious payloads into the 'inputBody' field in the Secure Messaging feature, which can then be sent to other users. When the recipient views the malicious message, the payload is executed, potentially compromising their account. This issue is fixed in version 7.0.2.1.

CVE-2024-37734 open-emr vulnerability CVSS: 0 26 Jun 2024, 22:15 UTC

An issue in OpenEMR 7.0.2 allows a remote attacker to escalate privileges viaa crafted POST request using the noteid parameter.

CVE-2024-26476 open-emr vulnerability CVSS: 0 28 Feb 2024, 22:15 UTC

An issue in open-emr before v.7.0.2 allows a remote attacker to escalate privileges via a crafted script to the formid parameter in the ereq_form.php component.

CVE-2023-2950 open-emr vulnerability CVSS: 0 28 May 2023, 04:15 UTC

Improper Authorization in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2949 open-emr vulnerability CVSS: 0 28 May 2023, 04:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2948 open-emr vulnerability CVSS: 0 28 May 2023, 04:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2947 open-emr vulnerability CVSS: 0 27 May 2023, 23:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2946 open-emr vulnerability CVSS: 0 27 May 2023, 23:15 UTC

Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2945 open-emr vulnerability CVSS: 0 27 May 2023, 22:15 UTC

Missing Authorization in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2944 open-emr vulnerability CVSS: 0 27 May 2023, 22:15 UTC

Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2943 open-emr vulnerability CVSS: 0 27 May 2023, 22:15 UTC

Code Injection in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2942 open-emr vulnerability CVSS: 0 27 May 2023, 22:15 UTC

Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2674 open-emr vulnerability CVSS: 0 12 May 2023, 08:15 UTC

Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-2566 open-emr vulnerability CVSS: 0 08 May 2023, 05:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.1.

CVE-2023-22974 open-emr vulnerability CVSS: 0 22 Feb 2023, 21:15 UTC

A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server.

CVE-2023-22973 open-emr vulnerability CVSS: 0 22 Feb 2023, 21:15 UTC

A Local File Inclusion (LFI) vulnerability in interface/forms/LBF/new.php in OpenEMR < 7.0.0 allows remote authenticated users to execute code via the formname parameter.

CVE-2023-22972 open-emr vulnerability CVSS: 0 22 Feb 2023, 21:15 UTC

A Reflected Cross-site scripting (XSS) vulnerability in interface/forms/eye_mag/php/eye_mag_functions.php in OpenEMR < 7.0.0 allows remote authenticated users to inject arbitrary web script or HTML via the REQUEST_URI.

CVE-2022-4733 open-emr vulnerability CVSS: 0 27 Dec 2022, 15:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-4615 open-emr vulnerability CVSS: 0 19 Dec 2022, 20:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-4567 open-emr vulnerability CVSS: 0 17 Dec 2022, 06:15 UTC

Improper Access Control in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-4506 open-emr vulnerability CVSS: 0 15 Dec 2022, 01:15 UTC

Unrestricted Upload of File with Dangerous Type in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-4505 open-emr vulnerability CVSS: 0 15 Dec 2022, 01:15 UTC

Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-4504 open-emr vulnerability CVSS: 0 15 Dec 2022, 01:15 UTC

Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-4503 open-emr vulnerability CVSS: 0 15 Dec 2022, 01:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-4502 open-emr vulnerability CVSS: 0 15 Dec 2022, 01:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.2.

CVE-2022-2824 open-emr vulnerability CVSS: 0 15 Aug 2022, 16:15 UTC

Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.

CVE-2022-2734 open-emr vulnerability CVSS: 0 09 Aug 2022, 13:15 UTC

Improper Restriction of Rendered UI Layers or Frames in GitHub repository openemr/openemr prior to 7.0.0.1.

CVE-2022-2733 open-emr vulnerability CVSS: 0 09 Aug 2022, 12:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.

CVE-2022-2732 open-emr vulnerability CVSS: 0 09 Aug 2022, 12:15 UTC

Missing Authorization in GitHub repository openemr/openemr prior to 7.0.0.1.

CVE-2022-2731 open-emr vulnerability CVSS: 0 09 Aug 2022, 12:15 UTC

Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.

CVE-2022-2730 open-emr vulnerability CVSS: 0 09 Aug 2022, 12:15 UTC

Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.

CVE-2022-2729 open-emr vulnerability CVSS: 0 09 Aug 2022, 12:15 UTC

Cross-site Scripting (XSS) - DOM in GitHub repository openemr/openemr prior to 7.0.0.1.

CVE-2022-2494 open-emr vulnerability CVSS: 0 22 Jul 2022, 04:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0.

CVE-2022-2493 open-emr vulnerability CVSS: 0 22 Jul 2022, 04:15 UTC

Data Access from Outside Expected Data Manager Component in GitHub repository openemr/openemr prior to 7.0.0.

CVE-2022-1461 open-emr vulnerability CVSS: 4.0 25 Apr 2022, 11:15 UTC

Non Privilege User can Enable or Disable Registered in GitHub repository openemr/openemr prior to 6.1.0.1.

CVE-2022-1459 open-emr vulnerability CVSS: 5.5 25 Apr 2022, 10:15 UTC

Non-Privilege User Can View Patient’s Disclosures in GitHub repository openemr/openemr prior to 6.1.0.1.

CVE-2022-1458 open-emr vulnerability CVSS: 3.5 25 Apr 2022, 10:15 UTC

Stored XSS Leads To Session Hijacking in GitHub repository openemr/openemr prior to 6.1.0.1.

CVE-2020-13567 open-emr vulnerability CVSS: 7.5 18 Apr 2022, 17:15 UTC

Multiple SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2022-1181 open-emr vulnerability CVSS: 3.5 30 Mar 2022, 12:15 UTC

Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.2.

CVE-2022-1180 open-emr vulnerability CVSS: 3.5 30 Mar 2022, 12:15 UTC

Reflected Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4.

CVE-2022-1179 open-emr vulnerability CVSS: 3.5 30 Mar 2022, 12:15 UTC

Non-Privilege User Can Created New Rule and Lead to Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4.

CVE-2022-1178 open-emr vulnerability CVSS: 3.5 30 Mar 2022, 12:15 UTC

Stored Cross Site Scripting in GitHub repository openemr/openemr prior to 6.0.0.4.

CVE-2022-1177 open-emr vulnerability CVSS: 4.0 30 Mar 2022, 11:15 UTC

Accounting User Can Download Patient Reports in openemr in GitHub repository openemr/openemr prior to 6.1.0.

CVE-2022-24643 open-emr vulnerability CVSS: 3.5 25 Mar 2022, 21:15 UTC

A stored cross-site scripting (XSS) issue was discovered in the OpenEMR Hospital Information Management System version 6.0.0.

CVE-2022-25041 open-emr vulnerability CVSS: 4.0 23 Mar 2022, 22:15 UTC

OpenEMR v6.0.0 was discovered to contain an incorrect access control issue.

CVE-2022-25471 open-emr vulnerability CVSS: 5.5 03 Mar 2022, 00:15 UTC

An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register.

CVE-2021-41843 open-emr vulnerability CVSS: 6.8 17 Dec 2021, 04:15 UTC

An authenticated SQL injection issue in the calendar search function of OpenEMR 6.0.0 before patch 3 allows an attacker to read data from all tables of the database via the parameter provider_id, as demonstrated by the /interface/main/calendar/index.php?module=PostCalendar&func=search URI.

CVE-2021-40352 open-emr vulnerability CVSS: 4.0 01 Sep 2021, 13:15 UTC

OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users.

CVE-2021-25923 open-emr vulnerability CVSS: 6.8 24 Jun 2021, 11:15 UTC

In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum password length limit. If a malicious user is aware of the first 72 characters of the victim user’s password, he can leverage it to an account takeover.

CVE-2021-32104 open-emr vulnerability CVSS: 6.5 07 May 2021, 04:15 UTC

A SQL injection vulnerability exists (with user privileges) in interface/forms/eye_mag/save.php in OpenEMR 5.0.2.1.

CVE-2021-32103 open-emr vulnerability CVSS: 3.5 07 May 2021, 04:15 UTC

A Stored XSS vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.1 allows a admin authenticated user to inject arbitrary web script or HTML via the lname parameter.

CVE-2021-32102 open-emr vulnerability CVSS: 6.5 07 May 2021, 04:15 UTC

A SQL injection vulnerability exists (with user privileges) in library/custom_template/ajax_code.php in OpenEMR 5.0.2.1.

CVE-2021-32101 open-emr vulnerability CVSS: 6.4 07 May 2021, 04:15 UTC

The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient.

CVE-2020-13568 open-emr vulnerability CVSS: 6.5 13 Apr 2021, 15:15 UTC

SQL injection vulnerability exists in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability in admin/edit_group.php, when the POST parameter action is “Submit”, the POST parameter parent_id leads to a SQL injection.

CVE-2020-13566 open-emr vulnerability CVSS: 6.5 13 Apr 2021, 15:15 UTC

SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability In admin/edit_group.php, when the POST parameter action is “Delete”, the POST parameter delete_group leads to a SQL injection.

CVE-2021-25922 open-emr vulnerability CVSS: 4.3 22 Mar 2021, 20:15 UTC

In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly. An attacker could trick a user to click on a malicious url and execute malicious code.

CVE-2021-25921 open-emr vulnerability CVSS: 3.5 22 Mar 2021, 20:15 UTC

In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly in the `Allergies` section. An attacker could lure an admin to enter a malicious payload and by that initiate the exploit.

CVE-2021-25920 open-emr vulnerability CVSS: 5.5 22 Mar 2021, 20:15 UTC

In OpenEMR, versions v2.7.2-rc1 to 6.0.0 are vulnerable to Improper Access Control when creating a new user, which leads to a malicious user able to read and send sensitive messages on behalf of the victim user.

CVE-2021-25919 open-emr vulnerability CVSS: 3.5 22 Mar 2021, 20:15 UTC

In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.

CVE-2021-25918 open-emr vulnerability CVSS: 3.5 22 Mar 2021, 20:15 UTC

In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the TOTP Authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.

CVE-2021-25917 open-emr vulnerability CVSS: 3.5 22 Mar 2021, 20:15 UTC

In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly and rendered in the U2F USB Device authentication method page. A highly privileged attacker could inject arbitrary code into input fields when creating a new user.

CVE-2020-29143 open-emr vulnerability CVSS: 6.5 15 Feb 2021, 21:15 UTC

A SQL injection vulnerability in interface/reports/non_reported.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter.

CVE-2020-29140 open-emr vulnerability CVSS: 6.5 15 Feb 2021, 21:15 UTC

A SQL injection vulnerability in interface/reports/immunization_report.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the form_code parameter.

CVE-2020-29139 open-emr vulnerability CVSS: 6.5 15 Feb 2021, 21:15 UTC

A SQL injection vulnerability in interface/main/finder/patient_select.php from library/patient.inc in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the searchFields parameter.

CVE-2020-29142 open-emr vulnerability CVSS: 6.5 15 Feb 2021, 20:15 UTC

A SQL injection vulnerability in interface/usergroup/usergroup_admin.php in OpenEMR before 5.0.2.5 allows a remote authenticated attacker to execute arbitrary SQL commands via the schedule_facility parameter when restrict_user_facility=on is in global settings.

CVE-2020-13565 open-emr vulnerability CVSS: 5.8 10 Feb 2021, 20:15 UTC

An open redirect vulnerability exists in the return_page redirection functionality of phpGACL 3.3.7, OpenEMR 5.0.2 and OpenEMR development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can redirect users to an arbitrary URL. An attacker can provide a crafted URL to trigger this vulnerability.

CVE-2020-36243 open-emr vulnerability CVSS: 9.0 07 Feb 2021, 20:15 UTC

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

CVE-2020-13564 open-emr vulnerability CVSS: 4.3 01 Feb 2021, 16:15 UTC

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template acl_id parameter.

CVE-2020-13563 open-emr vulnerability CVSS: 4.3 01 Feb 2021, 16:15 UTC

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnerability in the phpGACL template group_id parameter.

CVE-2020-13562 open-emr vulnerability CVSS: 4.3 01 Feb 2021, 16:15 UTC

A cross-site scripting vulnerability exists in the template functionality of phpGACL 3.3.7. A specially crafted HTTP request can lead to arbitrary JavaScript execution. An attacker can provide a crafted URL to trigger this vulnaerability in the phpGACL template action parameter.

CVE-2020-13569 open-emr vulnerability CVSS: 6.8 28 Jan 2021, 13:15 UTC

A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can send an HTTP request to trigger this vulnerability.

CVE-2020-19364 open-emr vulnerability CVSS: 6.5 20 Jan 2021, 01:15 UTC

OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious PHP scripts through /controller.php.

CVE-2018-16795 open-emr vulnerability CVSS: 6.8 31 Dec 2020, 03:15 UTC

OpenEMR 5.0.1.3 allows Cross-Site Request Forgery (CSRF) via library/ajax and interface/super, as demonstrated by use of interface/super/manage_site_files.php to upload a .php file.

CVE-2019-16404 open-emr vulnerability CVSS: 6.5 21 Oct 2019, 23:15 UTC

Authenticated SQL Injection in interface/forms/eye_mag/js/eye_base.php in OpenEMR through 5.0.2 allows a user to extract arbitrary data from the openemr database via a non-parameterized INSERT INTO statement, as demonstrated by the providerID parameter.

CVE-2019-17409 open-emr vulnerability CVSS: 4.3 21 Oct 2019, 01:15 UTC

Reflected XSS exists in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 ia the id parameter.

CVE-2019-16862 open-emr vulnerability CVSS: 4.3 21 Oct 2019, 01:15 UTC

Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter.

CVE-2019-17197 open-emr vulnerability CVSS: 7.5 05 Oct 2019, 19:15 UTC

OpenEMR through 5.0.2 has SQL Injection in the Lifestyle demographic filter criteria in library/clinical_rules.php that affects library/patient.inc.

CVE-2019-17179 open-emr vulnerability CVSS: 4.3 04 Oct 2019, 19:15 UTC

4.1.0, 4.1.1, 4.1.2, 4.1.2.3, 4.1.2.6, 4.1.2.7, 4.2.0, 4.2.1, 4.2.2, 5.0.0, 5.0.0.5, 5.0.0.6, 5.0.1, 5.0.1.1, 5.0.1.2, 5.0.1.3, 5.0.1.4, 5.0.1.5, 5.0.1.6, 5.0.1.7, 5.0.2, fixed in version 5.0.2.1

CVE-2019-8368 open-emr vulnerability CVSS: 4.3 16 Sep 2019, 18:15 UTC

OpenEMR v5.0.1-6 allows XSS.

CVE-2019-8371 open-emr vulnerability CVSS: 9.0 16 Sep 2019, 17:15 UTC

OpenEMR v5.0.1-6 allows code execution.

CVE-2019-3968 open-emr vulnerability CVSS: 9.0 20 Aug 2019, 19:15 UTC

In OpenEMR 5.0.1 and earlier, an authenticated attacker can execute arbitrary commands on the host system via the Scanned Forms interface when creating a new form.

CVE-2019-3967 open-emr vulnerability CVSS: 4.0 20 Aug 2019, 18:15 UTC

In OpenEMR 5.0.1 and earlier, the patient file download interface contains a directory traversal flaw that allows authenticated attackers to download arbitrary files from the host system.

CVE-2019-3966 open-emr vulnerability CVSS: 4.3 20 Aug 2019, 18:15 UTC

In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the foreign_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session.

CVE-2019-3965 open-emr vulnerability CVSS: 4.3 20 Aug 2019, 18:15 UTC

In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the document_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session.

CVE-2019-3964 open-emr vulnerability CVSS: 4.3 20 Aug 2019, 18:15 UTC

In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the doc_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session.

CVE-2019-3963 open-emr vulnerability CVSS: 4.3 20 Aug 2019, 18:15 UTC

In OpenEMR 5.0.1 and earlier, controller.php contains a reflected XSS vulnerability in the patient_id parameter. This could allow an attacker to execute arbitrary code in the context of a user's session.

CVE-2019-14530 open-emr vulnerability CVSS: 6.0 13 Aug 2019, 14:15 UTC

An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.

CVE-2019-14529 open-emr vulnerability CVSS: 7.5 02 Aug 2019, 14:15 UTC

OpenEMR before 5.0.2 allows SQL Injection in interface/forms/eye_mag/save.php.

CVE-2018-17181 open-emr vulnerability CVSS: 7.5 17 May 2019, 16:29 UTC

An issue was discovered in OpenEMR before 5.0.1 Patch 7. SQL Injection exists in the SaveAudit function in /portal/lib/paylib.php and the portalAudit function in /portal/lib/appsql.class.php.

CVE-2018-17180 open-emr vulnerability CVSS: 5.0 17 May 2019, 16:29 UTC

An issue was discovered in OpenEMR before 5.0.1 Patch 7. Directory Traversal exists via docid=../ to /portal/lib/download_template.php.

CVE-2018-17179 open-emr vulnerability CVSS: 7.5 17 May 2019, 16:29 UTC

An issue was discovered in OpenEMR before 5.0.1 Patch 7. There is SQL Injection in the make_task function in /interface/forms/eye_mag/php/taskman_functions.php via /interface/forms/eye_mag/taskman.php.

CVE-2018-18035 open-emr vulnerability CVSS: 4.3 02 Apr 2019, 22:29 UTC

A vulnerability in flashcanvas.swf in OpenEMR before 5.0.1 Patch 6 could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system.

CVE-2018-1000219 open-emr vulnerability CVSS: 3.5 20 Aug 2018, 20:29 UTC

OpenEMR version v5_0_1_4 contains a Cross Site Scripting (XSS) vulnerability in The 'scan' parameter in line #41 of interface/fax/fax_view.php that can result in The vulnerability could allow remote authenticated attackers to inject arbitrary web script or HTML.. This attack appear to be exploitable via The victim must visit on a specially crafted URL..

CVE-2018-1000218 open-emr vulnerability CVSS: 3.5 20 Aug 2018, 20:29 UTC

OpenEMR version v5_0_1_4 contains a Cross Site Scripting (XSS) vulnerability in The 'file' parameter in line #43 of interface/fax/fax_view.php that can result in The vulnerability could allow remote authenticated attackers to inject arbitrary web script or HTML.. This attack appear to be exploitable via The victim must visit on a specially crafted URL..

CVE-2018-15156 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/faxq.php after modifying the "hylafax_server" global variable in interface/super/edit_globals.php.

CVE-2018-15155 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/fax/fax_dispatch.php after modifying the "hylafax_enscript" global variable in interface/super/edit_globals.php.

CVE-2018-15154 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/billing/sl_eob_search.php after modifying the "print_command" global variable in interface/super/edit_globals.php.

CVE-2018-15153 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/main/daemon_frame.php after modifying the "hylafax_server" global variable in interface/super/edit_globals.php.

CVE-2018-15152 open-emr vulnerability CVSS: 6.4 15 Aug 2018, 17:29 UTC

Authentication bypass vulnerability in portal/account/register.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker to access (1) portal/add_edit_event_user.php, (2) portal/find_appt_popup_user.php, (3) portal/get_allergies.php, (4) portal/get_amendments.php, (5) portal/get_lab_results.php, (6) portal/get_medications.php, (7) portal/get_patient_documents.php, (8) portal/get_problems.php, (9) portal/get_profile.php, (10) portal/portal_payment.php, (11) portal/messaging/messages.php, (12) portal/messaging/secure_chat.php, (13) portal/report/pat_ledger.php, (14) portal/report/portal_custom_report.php, or (15) portal/report/portal_patient_report.php without authenticating as a patient.

CVE-2018-15151 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

SQL injection vulnerability in interface/de_identification_forms/find_code_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'search_term' parameter.

CVE-2018-15150 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

SQL injection vulnerability in interface/de_identification_forms/de_identification_screen2.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'temporary_files_dir' variable in interface/super/edit_globals.php.

CVE-2018-15149 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

SQL injection vulnerability in interface/forms/eye_mag/php/Anything_simple.php from library/forms.inc in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'encounter' parameter.

CVE-2018-15148 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

SQL injection vulnerability in interface/patient_file/encounter/search_code.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'text' parameter.

CVE-2018-15147 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

SQL injection vulnerability in interface/forms_admin/forms_admin.php from library/registry.inc in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'id' parameter.

CVE-2018-15146 open-emr vulnerability CVSS: 6.5 15 Aug 2018, 17:29 UTC

SQL injection vulnerability in interface/de_identification_forms/find_immunization_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the 'search_term' parameter.

CVE-2018-15145 open-emr vulnerability CVSS: 7.5 13 Aug 2018, 18:29 UTC

Multiple SQL injection vulnerabilities in portal/add_edit_event_user.php in versions of OpenEMR before 5.0.1.4 allow a remote attacker to execute arbitrary SQL commands via the (1) eid, (2) userid, or (3) pid parameter.

CVE-2018-15144 open-emr vulnerability CVSS: 6.5 13 Aug 2018, 18:29 UTC

SQL injection vulnerability in interface/de_identification_forms/find_drug_popup.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary SQL commands via the search_term parameter.

CVE-2018-15143 open-emr vulnerability CVSS: 7.5 13 Aug 2018, 18:29 UTC

Multiple SQL injection vulnerabilities in portal/find_appt_popup_user.php in versions of OpenEMR before 5.0.1.4 allow a remote attacker to execute arbitrary SQL commands via the (1) catid or (2) providerid parameter.

CVE-2018-15142 open-emr vulnerability CVSS: 6.5 13 Aug 2018, 18:29 UTC

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.

CVE-2018-15141 open-emr vulnerability CVSS: 5.5 13 Aug 2018, 18:29 UTC

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to delete arbitrary files via the "docid" parameter when the mode is set to delete.

CVE-2018-15140 open-emr vulnerability CVSS: 4.0 13 Aug 2018, 18:29 UTC

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to read arbitrary files via the "docid" parameter when the mode is set to get.

CVE-2018-15139 open-emr vulnerability CVSS: 6.5 13 Aug 2018, 18:29 UTC

Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory.

CVE-2018-9250 open-emr vulnerability CVSS: 6.5 18 May 2018, 14:29 UTC

interface\super\edit_list.php in OpenEMR before v5_0_1_1 allows remote authenticated users to execute arbitrary SQL commands via the newlistname parameter.

CVE-2018-10573 open-emr vulnerability CVSS: 6.5 30 Apr 2018, 17:29 UTC

interface/fax/fax_dispatch.php in OpenEMR before 5.0.1 allows remote authenticated users to bypass intended access restrictions via the scan parameter.

CVE-2018-10572 open-emr vulnerability CVSS: 5.5 30 Apr 2018, 17:29 UTC

interface/patient_file/letter.php in OpenEMR before 5.0.1 allows remote authenticated users to bypass intended access restrictions via the newtemplatename and form_body parameters.

CVE-2018-10571 open-emr vulnerability CVSS: 4.3 30 Apr 2018, 17:29 UTC

Multiple reflected cross-site scripting (XSS) vulnerabilities in OpenEMR before 5.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) patient parameter to interface/main/finder/finder_navigation.php; (2) key parameter to interface/billing/get_claim_file.php; (3) formid or (4) formseq parameter to interface/orders/types.php; (5) eraname, (6) paydate, (7) post_to_date, (8) deposit_date, (9) debug, or (10) InsId parameter to interface/billing/sl_eob_process.php; (11) form_source, (12) form_paydate, (13) form_deposit_date, (14) form_amount, (15) form_name, (16) form_pid, (17) form_encounter, (18) form_date, or (19) form_to_date parameter to interface/billing/sl_eob_search.php; (20) codetype or (21) search_term parameter to interface/de_identification_forms/find_code_popup.php; (22) search_term parameter to interface/de_identification_forms/find_drug_popup.php; (23) search_term parameter to interface/de_identification_forms/find_immunization_popup.php; (24) id parameter to interface/forms/CAMOS/view.php; (25) id parameter to interface/forms/reviewofs/view.php; or (26) list_id parameter to library/custom_template/personalize.php.

CVE-2018-1000020 open-emr vulnerability CVSS: 4.3 09 Feb 2018, 23:29 UTC

OpenEMR version 5.0.0 contains a Cross Site Scripting (XSS) vulnerability in open-flash-chart.swf and _posteddata.php that can result in . This vulnerability appears to have been fixed in 5.0.0 Patch 2 or higher.

CVE-2018-1000019 open-emr vulnerability CVSS: 9.0 09 Feb 2018, 23:29 UTC

OpenEMR version 5.0.0 contains a OS Command Injection vulnerability in fax_dispatch.php that can result in OS command injection by an authenticated attacker with any role. This vulnerability appears to have been fixed in 5.0.0 Patch 2 or higher.

CVE-2017-1000241 open-emr vulnerability CVSS: 6.5 17 Nov 2017, 03:29 UTC

The application OpenEMR version 5.0.0, 5.0.1-dev and prior is affected by vertical privilege escalation vulnerability. This vulnerability can allow an authenticated non-administrator users to view and modify information only accessible to administrators.

CVE-2017-1000240 open-emr vulnerability CVSS: 3.5 17 Nov 2017, 03:29 UTC

The application OpenEMR is affected by multiple reflected & stored Cross-Site Scripting (XSS) vulnerabilities affecting version 5.0.0 and prior versions. These vulnerabilities could allow remote authenticated attackers to inject arbitrary web script or HTML.

CVE-2017-16540 open-emr vulnerability CVSS: 5.0 04 Nov 2017, 19:29 UTC

OpenEMR before 5.0.0 Patch 5 allows unauthenticated remote database copying because setup.php exposes functionality for cloning an existing OpenEMR site to an arbitrary attacker-controlled MySQL server via vectors involving a crafted state parameter.

CVE-2017-12064 open-emr vulnerability CVSS: 5.0 01 Aug 2017, 05:29 UTC

The csv_log_html function in library/edihistory/edih_csv_inc.php in OpenEMR 5.0.0 and prior allows attackers to bypass intended access restrictions via a crafted name.

CVE-2017-9380 open-emr vulnerability CVSS: 6.5 02 Jun 2017, 15:29 UTC

OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application.

CVE-2017-6394 open-emr vulnerability CVSS: 4.3 02 Mar 2017, 06:59 UTC

Multiple Cross-Site Scripting (XSS) issues were discovered in OpenEMR 5.0.0 and 5.0.1-dev. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to the "openemr-master/gacl/admin/object_search.php" URL (section_value; src_form). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.

CVE-2015-4453 open-emr vulnerability CVSS: 5.0 05 Jul 2015, 01:59 UTC

interface/globals.php in OpenEMR 2.x, 3.x, and 4.x before 4.2.0 patch 2 allows remote attackers to bypass authentication and obtain sensitive information via an ignoreAuth=1 value to certain scripts, as demonstrated by (1) interface/fax/fax_dispatch_newpid.php and (2) interface/billing/sl_eob_search.php.

CVE-2014-5462 open-emr vulnerability CVSS: 6.5 08 Dec 2014, 16:59 UTC

Multiple SQL injection vulnerabilities in OpenEMR 4.1.2 (Patch 7) and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) layout_id parameter to interface/super/edit_layout.php; (2) form_patient_id, (3) form_drug_name, or (4) form_lot_number parameter to interface/reports/prescriptions_report.php; (5) payment_id parameter to interface/billing/edit_payment.php; (6) id parameter to interface/forms_admin/forms_admin.php; (7) form_pid or (8) form_encounter parameter to interface/billing/sl_eob_search.php; (9) sortby parameter to interface/logview/logview.php; form_facility parameter to (10) procedure_stats.php, (11) pending_followup.php, or (12) pending_orders.php in interface/orders/; (13) patient, (14) encounterid, (15) formid, or (16) issue parameter to interface/patient_file/deleter.php; (17) search_term parameter to interface/patient_file/encounter/coding_popup.php; (18) text parameter to interface/patient_file/encounter/search_code.php; (19) form_addr1, (20) form_addr2, (21) form_attn, (22) form_country, (23) form_freeb_type, (24) form_partner, (25) form_name, (26) form_zip, (27) form_state, (28) form_city, or (29) form_cms_id parameter to interface/practice/ins_search.php; (30) form_pid parameter to interface/patient_file/problem_encounter.php; (31) patient, (32) form_provider, (33) form_apptstatus, or (34) form_facility parameter to interface/reports/appointments_report.php; (35) db_id parameter to interface/patient_file/summary/demographics_save.php; (36) p parameter to interface/fax/fax_dispatch_newpid.php; or (37) patient_id parameter to interface/patient_file/reminder/patient_reminders.php.

CVE-2013-4620 open-emr vulnerability CVSS: 4.3 09 Aug 2013, 21:55 UTC

Cross-site scripting (XSS) vulnerability in interface/main/onotes/office_comments_full.php in OpenEMR 4.1.1 allows remote attackers to inject arbitrary web script or HTML via the note parameter.

CVE-2013-4619 open-emr vulnerability CVSS: 6.5 09 Aug 2013, 21:55 UTC

Multiple SQL injection vulnerabilities in OpenEMR 4.1.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) start or (2) end parameter to interface/reports/custom_report_range.php, or the (3) form_newid parameter to custom/chart_tracker.php.

CVE-2012-2115 open-emr vulnerability CVSS: 7.5 09 Sep 2012, 21:55 UTC

SQL injection vulnerability in interface/login/validateUser.php in OpenEMR 4.1.0 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the u parameter.

CVE-2011-5161 open-emr vulnerability CVSS: 6.8 09 Sep 2012, 21:55 UTC

Unrestricted file upload vulnerability in the patient photograph functionality in OpenEMR 4 allows remote attackers to execute arbitrary PHP code by uploading a file with an executable extension followed by a safe extension, then accessing it via a direct request to the patient directory under documents/.

CVE-2011-5160 open-emr vulnerability CVSS: 4.3 09 Sep 2012, 21:55 UTC

Cross-site scripting (XSS) vulnerability in setup.php in OpenEMR 4 allows remote attackers to inject arbitrary web script or HTML via the site parameter.