CVE-2026-32120

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an Insecure Direct Object Reference (IDOR) vulnerability in the fee sheet product save logic (`library/FeeSheet.class.php`) allows any authenticated user with fee sheet ACL access to delete, modify, or read `drug_sales` records belonging to arbitrary patients by manipulating the hidden `prod[][sale_id]` form field. The `save()` method uses the user-supplied `sale_id` in five SQL queries (SELECT, UPDATE, DELETE) without verifying that the record belongs to the current patient and encounter. Version 8.0.0.3 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

26 Mar 2026, 18:03

Type Values Removed Values Added
First Time Open-emr openemr
Open-emr
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Summary
  • (es) OpenEMR es una aplicación gratuita y de código abierto para la gestión de historias clínicas electrónicas y consultas médicas. Antes de la versión 8.0.0.3, una vulnerabilidad de referencia directa a objetos insegura (IDOR) en la lógica de guardado del producto «hoja de tarifas» (`library/FeeSheet.class.php`) permite a cualquier usuario autenticado con acceso ACL a la hoja de tarifas eliminar, modificar o leer registros `drug_sales` pertenecientes a pacientes arbitrarios mediante la manipulación del campo oculto del formulario `prod[][sale_id]`. El método `save()` utiliza el `sale_id` proporcionado por el usuario en cinco consultas SQL (SELECT, UPDATE, DELETE) sin verificar que el registro pertenezca al paciente y a la consulta actuales. La versión 8.0.0.3 contiene un parche.
References () https://github.com/openemr/openemr/commit/c5b4dd8caf2af70617cc58d39188621ed90543dc - () https://github.com/openemr/openemr/commit/c5b4dd8caf2af70617cc58d39188621ed90543dc - Patch
References () https://github.com/openemr/openemr/releases/tag/v8_0_0_3 - () https://github.com/openemr/openemr/releases/tag/v8_0_0_3 - Product
References () https://github.com/openemr/openemr/security/advisories/GHSA-pvvj-mv7h-7847 - () https://github.com/openemr/openemr/security/advisories/GHSA-pvvj-mv7h-7847 - Exploit, Vendor Advisory

26 Mar 2026, 15:16

Type Values Removed Values Added
References () https://github.com/openemr/openemr/security/advisories/GHSA-pvvj-mv7h-7847 - () https://github.com/openemr/openemr/security/advisories/GHSA-pvvj-mv7h-7847 -

25 Mar 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 23:17

Updated : 2026-03-26 18:03


NVD link : CVE-2026-32120

Mitre link : CVE-2026-32120

CVE.ORG link : CVE-2026-32120


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-639

Authorization Bypass Through User-Controlled Key