Home

Description

OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, an arbitrary file exfiltration vulnerability in the fax sending endpoint allows any authenticated user to read and transmit any file on the server (including database credentials, patient documents, system files, and source code) via fax to an attacker-controlled phone number. The vulnerability exists because the endpoint accepts arbitrary file paths from user input and streams them to the fax gateway without path restrictions or authorization checks. As of time of publication, no known patched versions are available.

PUBLISHED Reserved 2026-01-23 | Published 2026-02-27 | Updated 2026-02-27 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

<= 8.0.0
affected

References

github.com/...penemr/security/advisories/GHSA-765x-8v97-c7g8

github.com/...dule-faxsms/src/Controller/EtherFaxActions.php

cve.org (CVE-2026-24488)

nvd.nist.gov (CVE-2026-24488)

Download JSON