CVE-2026-24896 PUBLISHED

OpenEMR has Broken Access Control that allows unauthorized access to EDI Logs

Assigner: GitHub_M
Reserved: 27.01.2026 Published: 25.02.2026 Updated: 25.02.2026

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in OpenEMR’s edih_main.php endpoint, which allows any authenticated user—including low-privilege roles like Receptionist—to access EDI log files by manipulating the log_select parameter in a GET request. The back-end fails to enforce role-based access control (RBAC), allowing sensitive system logs to be accessed outside the GUI-enforced permission boundaries. Version 8.0.0 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 6.5

Product Status

Vendor openemr
Product openemr
Versions
  • Version < 8.0.0 is affected

References

Problem Types

  • CWE-284: Improper Access Control CWE