OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the DICOM viewer state API (e.g. upload or state save/load) accepts a document ID (`doc_id`) without verifying that the document belongs to the current user’s authorized patient or encounter. An authenticated user can read or modify DICOM viewer state (e.g. annotations, view settings) for any document by enumerating document IDs. Version 8.0.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/security/advisories/GHSA-qj9f-x7v2-hrr7 | Exploit Vendor Advisory |
Configurations
History
27 Feb 2026, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | |
| First Time |
Open-emr openemr
Open-emr |
|
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-qj9f-x7v2-hrr7 - Exploit, Vendor Advisory |
25 Feb 2026, 19:43
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-25 19:43
Updated : 2026-02-27 14:40
NVD link : CVE-2026-25927
Mitre link : CVE-2026-25927
CVE.ORG link : CVE-2026-25927
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
