CVE-2026-25745

OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) updates by message/note ID only and does not verify that the message belongs to the current patient (or that the user is allowed to edit that patient’s notes). An authenticated user with notes permission can modify any patient’s messages by supplying another message ID. Commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41 contains a fix for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

20 Mar 2026, 19:16

Type Values Removed Values Added
References () https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh - Exploit, Vendor Advisory () https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh - Exploit, Vendor Advisory

19 Mar 2026, 19:00

Type Values Removed Values Added
First Time Open-emr openemr
Open-emr
References () https://github.com/openemr/openemr/commit/92a2ff9eaaa80674b3a934a6556e35e7aded5a41 - () https://github.com/openemr/openemr/commit/92a2ff9eaaa80674b3a934a6556e35e7aded5a41 - Patch
References () https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh - () https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh - Exploit, Vendor Advisory
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

18 Mar 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-18 21:16

Updated : 2026-03-20 19:16


NVD link : CVE-2026-25745

Mitre link : CVE-2026-25745

CVE.ORG link : CVE-2026-25745


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-639

Authorization Bypass Through User-Controlled Key