CVE-2026-25927

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the DICOM viewer state API (e.g. upload or state save/load) accepts a document ID (`doc_id`) without verifying that the document belongs to the current user’s authorized patient or encounter. An authenticated user can read or modify DICOM viewer state (e.g. annotations, view settings) for any document by enumerating document IDs. Version 8.0.0 fixes the issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

27 Feb 2026, 14:40

Type Values Removed Values Added
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
First Time Open-emr openemr
Open-emr
References () https://github.com/openemr/openemr/security/advisories/GHSA-qj9f-x7v2-hrr7 - () https://github.com/openemr/openemr/security/advisories/GHSA-qj9f-x7v2-hrr7 - Exploit, Vendor Advisory

25 Feb 2026, 19:43

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-25 19:43

Updated : 2026-02-27 14:40


NVD link : CVE-2026-25927

Mitre link : CVE-2026-25927

CVE.ORG link : CVE-2026-25927


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-639

Authorization Bypass Through User-Controlled Key