OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, OpenEMR contains a SQL injection vulnerability in the ajax graphs library that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the ajax graphs library. This vulnerability is fixed in 8.0.0.1.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/security/advisories/GHSA-v8q6-h79f-736x | Exploit Vendor Advisory |
Configurations
History
13 Mar 2026, 15:44
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Open-emr openemr
Open-emr |
|
| References | () https://github.com/openemr/openemr/security/advisories/GHSA-v8q6-h79f-736x - Exploit, Vendor Advisory | |
| Summary |
|
|
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* |
11 Mar 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 21:16
Updated : 2026-03-13 15:44
NVD link : CVE-2026-32127
Mitre link : CVE-2026-32127
CVE.ORG link : CVE-2026-32127
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
