CVE-2026-24848

OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells.
References
Link Resource
https://github.com/openemr/openemr/security/advisories/GHSA-5vp5-4rm6-h4c9 Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

04 Mar 2026, 21:58

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.9
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
References () https://github.com/openemr/openemr/security/advisories/GHSA-5vp5-4rm6-h4c9 - () https://github.com/openemr/openemr/security/advisories/GHSA-5vp5-4rm6-h4c9 - Exploit, Mitigation, Vendor Advisory
First Time Open-emr openemr
Open-emr

03 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-03 22:16

Updated : 2026-03-04 21:58


NVD link : CVE-2026-24848

Mitre link : CVE-2026-24848

CVE.ORG link : CVE-2026-24848


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')