CVE-2022-2824
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass authorization controls and gain access to restricted areas of the OpenEMR application. To exploit this, the attacker needs to manipulate a user-controlled key, which could happen if they have access to the application or its configuration.
Technical Description
Authorization Bypass Through User-Controlled Key in GitHub repository openemr/openemr prior to 7.0.0.1.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Aug 15, 2022
over 3 years ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
open-emr
Product
openemr
Related Vulnerabilities
This vulnerability allows an attacker to send any file from the server, including sensitive information like database credentials and patient documents, to a phone number they control. It can be exploited by any authenticated user of the system, as the application does not properly restrict which files can be accessed or sent.
This vulnerability allows an attacker to access sensitive information or perform unauthorized actions within the OpenEMR system if they can exploit the missing authorization checks. It affects versions prior to 7.0.0.1, meaning users running older versions are at risk.