Open-emr Vulnerabilities
Comprehensive security vulnerability database for Open-emr products
2
0
3
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-24488 | 6.5 | This vulnerability allows an attacker to send any file from the server, including sensitive information like database credentials and patient documents, to a phone number they control. It can be exploited by any authenticated user of the system, as the application does not properly restrict which files can be accessed or sent. | open-emropenemr | Exploit Available | about 1 month agoFeb 27, 2026 |
| CVE-2022-2824 | 5.4 | This vulnerability allows an attacker to bypass authorization controls and gain access to restricted areas of the OpenEMR application. To exploit this, the attacker needs to manipulate a user-controlled key, which could happen if they have access to the application or its configuration. | open-emropenemr | Exploit Available | over 3 years agoAug 15, 2022 |
About Open-emr Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Open-emr products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.