OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from the server filesystem. Any authenticated user (regardless of privilege level) can exploit this vulnerability to read sensitive files. Version 7.0.4 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/commit/22f8e53e5769a88b7a16cb223bd197d044c84e5a | Patch |
| https://github.com/openemr/openemr/security/advisories/GHSA-w6vc-hx2x-48pc | Exploit Mitigation Vendor Advisory |
Configurations
History
25 Feb 2026, 16:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | |
| References | () https://github.com/openemr/openemr/commit/22f8e53e5769a88b7a16cb223bd197d044c84e5a - Patch | |
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-w6vc-hx2x-48pc - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Open-emr openemr
Open-emr |
25 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 02:16
Updated : 2026-02-25 16:56
NVD link : CVE-2026-24849
Mitre link : CVE-2026-24849
CVE.ORG link : CVE-2026-24849
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
