OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/security/advisories/GHSA-5vp5-4rm6-h4c9 | Exploit Mitigation Vendor Advisory |
Configurations
History
04 Mar 2026, 21:58
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | |
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-5vp5-4rm6-h4c9 - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Open-emr openemr
Open-emr |
03 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-03 22:16
Updated : 2026-03-04 21:58
NVD link : CVE-2026-24848
Mitre link : CVE-2026-24848
CVE.ORG link : CVE-2026-24848
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
