CVE-2026-24849

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from the server filesystem. Any authenticated user (regardless of privilege level) can exploit this vulnerability to read sensitive files. Version 7.0.4 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

25 Feb 2026, 16:56

Type Values Removed Values Added
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
References () https://github.com/openemr/openemr/commit/22f8e53e5769a88b7a16cb223bd197d044c84e5a - () https://github.com/openemr/openemr/commit/22f8e53e5769a88b7a16cb223bd197d044c84e5a - Patch
References () https://github.com/openemr/openemr/security/advisories/GHSA-w6vc-hx2x-48pc - () https://github.com/openemr/openemr/security/advisories/GHSA-w6vc-hx2x-48pc - Exploit, Mitigation, Vendor Advisory
First Time Open-emr openemr
Open-emr

25 Feb 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-25 02:16

Updated : 2026-02-25 16:56


NVD link : CVE-2026-24849

Mitre link : CVE-2026-24849

CVE.ORG link : CVE-2026-24849


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')