Home

Description

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from the server filesystem. Any authenticated user (regardless of privilege level) can exploit this vulnerability to read sensitive files. Version 7.0.4 patches the issue.

PUBLISHED Reserved 2026-01-27 | Published 2026-02-25 | Updated 2026-02-25 | Assigner GitHub_M




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

< 7.0.4
affected

References

github.com/...penemr/security/advisories/GHSA-w6vc-hx2x-48pc

github.com/...ommit/22f8e53e5769a88b7a16cb223bd197d044c84e5a

cve.org (CVE-2026-24849)

nvd.nist.gov (CVE-2026-24849)

Download JSON