Description
OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) updates by message/note ID only and does not verify that the message belongs to the current patient (or that the user is allowed to edit that patient’s notes). An authenticated user with notes permission can modify any patient’s messages by supplying another message ID. Commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41 contains a fix for the issue.
Published: 2026-03-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Message Modification
Action: Immediate Patch
AI Analysis

Impact

OpenEMR's message/note update endpoint performs updates based solely on the supplied message ID and does not verify that the message belongs to the patient associated with the authenticated user. This allows any authenticated user with note permissions to modify another patient's notes by providing a different message ID. The vulnerability enables unauthorized alteration of medical records, compromising the integrity and confidentiality of patient data. The weakness is a classic example of CWE-639 (Authorization Bypass Through User-Controlled Key).

Affected Systems

Vendors: openemr; products: openemr. Affected releases are all versions through 8.0.0, including the latest release before the fix commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41. No higher version is listed as affected.

Risk and Exploitability

CVSS score 6.5 indicates moderate severity. The EPSS score is less than 1%, indicating a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an authenticated session with note editing rights, meaning the attack vector is internal or requires compromise of credentials; it is not a remote unauthenticated exploit.

Generated by OpenCVE AI on March 19, 2026 at 20:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch from commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41
  • Ensure user permissions are correctly configured for notes editing
  • Monitor logs for unauthorized note updates

Generated by OpenCVE AI on March 19, 2026 at 20:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 18 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) updates by message/note ID only and does not verify that the message belongs to the current patient (or that the user is allowed to edit that patient’s notes). An authenticated user with notes permission can modify any patient’s messages by supplying another message ID. Commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41 contains a fix for the issue.
Title OpenEMR's Message Update Ignores Patient id
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T18:12:04.827Z

Reserved: 2026-02-05T16:48:00.428Z

Link: CVE-2026-25745

cve-icon Vulnrichment

Updated: 2026-03-20T17:12:14.401Z

cve-icon NVD

Status : Modified

Published: 2026-03-18T21:16:25.043

Modified: 2026-03-20T19:16:13.617

Link: CVE-2026-25745

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:52:17Z

Weaknesses