OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, when a link is sent via Secure Messaging, clicking the link opens the website within the OpenEMR/Portal site. This behavior could be exploited for phishing. Version 7.0.4 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/commit/11ec62d1683571a629734fba66f7fb68d0bdc312 | Patch |
| https://github.com/openemr/openemr/security/advisories/GHSA-566c-8c52-2jch | Exploit Vendor Advisory |
Configurations
History
25 Feb 2026, 17:00
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | |
| First Time |
Open-emr openemr
Open-emr |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.0 |
| References | () https://github.com/openemr/openemr/commit/11ec62d1683571a629734fba66f7fb68d0bdc312 - Patch | |
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-566c-8c52-2jch - Exploit, Vendor Advisory |
25 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 02:16
Updated : 2026-02-25 17:00
NVD link : CVE-2025-68277
Mitre link : CVE-2025-68277
CVE.ORG link : CVE-2025-68277
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-451
User Interface (UI) Misrepresentation of Critical Information
