OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) updates by message/note ID only and does not verify that the message belongs to the current patient (or that the user is allowed to edit that patient’s notes). An authenticated user with notes permission can modify any patient’s messages by supplying another message ID. Commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41 contains a fix for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/commit/92a2ff9eaaa80674b3a934a6556e35e7aded5a41 | Patch |
| https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh | Exploit Vendor Advisory |
| https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh | Exploit Vendor Advisory |
Configurations
History
20 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh - Exploit, Vendor Advisory |
19 Mar 2026, 19:00
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Open-emr openemr
Open-emr |
|
| References | () https://github.com/openemr/openemr/commit/92a2ff9eaaa80674b3a934a6556e35e7aded5a41 - Patch | |
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* |
18 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-18 21:16
Updated : 2026-03-20 19:16
NVD link : CVE-2026-25745
Mitre link : CVE-2026-25745
CVE.ORG link : CVE-2026-25745
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
