Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in OpenEMR’s edih_main.php endpoint, which allows any authenticated user—including low-privilege roles like Receptionist—to access EDI log files by manipulating the log_select parameter in a GET request. The back-end fails to enforce role-based access control (RBAC), allowing sensitive system logs to be accessed outside the GUI-enforced permission boundaries. Version 8.0.0 fixes the issue.
Published: 2026-02-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Sensitive EDI Log Files
Action: Patch Upgrade
AI Analysis

Impact

A flaw in OpenEMR’s edih_main.php endpoint allows any authenticated user—including low‑privilege roles such as Receptionist—to retrieve EDI log files by tampering with the log_select GET parameter. The back‑end neglects role‑based access control, permitting read access to logs that are normally protected within the GUI. The vulnerability is a classic Broken Access Control issue, identified as CWE‑284.

Affected Systems

Older OpenEMR releases prior to version 8.0.0 are susceptible. Users running the openemr:openemr product with versions earlier than 8.0.0 are at risk; the update to 8.0.0 resolves the flaw.

Risk and Exploitability

The CVSS score of 6.5 classifies this as a medium‑severity vulnerability, and the EPSS score of less than 1% indicates a low likelihood of exploitation at the time of analysis. The flaw does not appear in the CISA KEV list, yet it requires authentication and is therefore likely to be leveraged by internal users or an attacker who has compromised legitimate credentials. Exploitation is straightforward: an attacker logs in, performs a GET request to edih_main.php with a manipulated log_select value, and obtains the log file. No additional privileges or conditions are required beyond authenticated access.

Generated by OpenCVE AI on April 17, 2026 at 15:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenEMR to version 8.0.0 or later to apply the vendor patch that enforces proper role‑based access control on the edih_main.php endpoint.
  • After upgrading, validate that only users with administrative privileges can invoke the log_select functionality by performing test requests or reviewing access logs.
  • If an immediate upgrade is not possible, restrict the edih_main.php endpoint to administrators only at the web‑server level (e.g., using .htaccess or equivalent configuration rules) to prevent unauthorized log access until the patch can be applied.

Generated by OpenCVE AI on April 17, 2026 at 15:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 25 Feb 2026 02:00:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in OpenEMR’s edih_main.php endpoint, which allows any authenticated user—including low-privilege roles like Receptionist—to access EDI log files by manipulating the log_select parameter in a GET request. The back-end fails to enforce role-based access control (RBAC), allowing sensitive system logs to be accessed outside the GUI-enforced permission boundaries. Version 8.0.0 fixes the issue.
Title OpenEMR has Broken Access Control that allows unauthorized access to EDI Logs
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-25T20:58:20.711Z

Reserved: 2026-01-27T19:35:20.529Z

Link: CVE-2026-24896

cve-icon Vulnrichment

Updated: 2026-02-25T20:58:13.049Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T02:16:22.353

Modified: 2026-02-25T16:54:24.783

Link: CVE-2026-24896

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:45:15Z

Weaknesses