OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the Claim File Tracker feature exposes an AJAX endpoint that returns billing claim metadata (claim IDs, payer info, transmission logs). The endpoint does not enforce the same ACL as the main billing/claims workflow, so authenticated users without appropriate billing permissions can access this data. This vulnerability is fixed in 8.0.0.1.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/security/advisories/GHSA-rwf9-px3c-3prw | Exploit Vendor Advisory |
Configurations
History
13 Mar 2026, 15:48
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Open-emr openemr
Open-emr |
|
| Summary |
|
|
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-rwf9-px3c-3prw - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* |
11 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 21:16
Updated : 2026-03-13 15:48
NVD link : CVE-2026-32122
Mitre link : CVE-2026-32122
CVE.ORG link : CVE-2026-32122
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-862
Missing Authorization
