CVE-2026-25220

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the Message Center accepts the URL parameter `show_all=yes` and passes it to `getPnotesByUser()`, which returns all internal messages (all users’ notes). The backend does not verify that the requesting user is an administrator before honoring `show_all=yes`. The "Show All" link is also visible to non-admin users. As a result, any authenticated user can view the entire internal message list by requesting `messages.php?show_all=yes`. Version 8.0.0 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

27 Feb 2026, 14:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
First Time Open-emr openemr
Open-emr
References () https://github.com/openemr/openemr/commit/9f2c44fc88fc051fcf0b6922c373977543e6b2af - () https://github.com/openemr/openemr/commit/9f2c44fc88fc051fcf0b6922c373977543e6b2af - Patch
References () https://github.com/openemr/openemr/security/advisories/GHSA-phcp-7qjx-83cm - () https://github.com/openemr/openemr/security/advisories/GHSA-phcp-7qjx-83cm - Exploit, Vendor Advisory

26 Feb 2026, 17:23

Type Values Removed Values Added
References () https://github.com/openemr/openemr/security/advisories/GHSA-phcp-7qjx-83cm - () https://github.com/openemr/openemr/security/advisories/GHSA-phcp-7qjx-83cm -

25 Feb 2026, 19:43

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-25 19:43

Updated : 2026-02-27 14:41


NVD link : CVE-2026-25220

Mitre link : CVE-2026-25220

CVE.ORG link : CVE-2026-25220


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-639

Authorization Bypass Through User-Controlled Key