Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the DICOM viewer state API (e.g. upload or state save/load) accepts a document ID (`doc_id`) without verifying that the document belongs to the current user’s authorized patient or encounter. An authenticated user can read or modify DICOM viewer state (e.g. annotations, view settings) for any document by enumerating document IDs. Version 8.0.0 fixes the issue.
Published: 2026-02-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access to Patient DICOM Viewer State
Action: Apply Patch
AI Analysis

Impact

The vulnerability lies in the DICOM viewer state API, where an authenticated user can provide a document ID without the system verifying that the document belongs to that user's authorized patient or encounter. As a result, the user can view or alter the viewer state—such as annotations and view settings—for any DICOM document in the system. This missing authorization check enables a potential breach of patient privacy and could lead to misrepresentation of imaging data if an attacker changes annotations or viewing parameters. The weakness corresponds to CWE‑639. The impact is limited to data and settings associated with the viewer state, but misuse could still expose sensitive patient information or disrupt correct clinical interpretation.

Affected Systems

The flaw affects all OpenEMR installations running a version older than 8.0.0. The products listed by the CNA are OpenEMR, a free and open source electronic health records system. No specific version numbers are listed beyond the statement that 8.0.0 and later contain a fix.

Risk and Exploitability

The CVSS score of 7.1 indicates a medium severity vulnerability. The EPSS score of less than 1% suggests that the likelihood of exploitation is low at this time, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers must first authenticate to the system, which is typically performed remotely by gaining user credentials. From that position, enumeration of document IDs allows abuse of the vulnerable API endpoints. Because the API lacks authorization checks, any authenticated user can read or modify state for any document, making the attack path straightforward once credentials are obtained. Overall risk is moderate, driven primarily by the requirement of valid authentication and the low exploitation probability reported.

Generated by OpenCVE AI on April 17, 2026 at 15:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenEMR to version 8.0.0 or later, which implements proper authorization checks on the DICOM viewer state API.
  • If an upgrade is not immediately possible, enforce network or application layer restrictions so that only trusted network segments or authenticated users with explicit patient or encounter access can reach the DICOM viewer state endpoints.
  • Monitor access logs for unusual activity involving the DICOM viewer state API and audit document identifiers accessed by authenticated users, ensuring that users are only accessing documents they are authorized to view.

Generated by OpenCVE AI on April 17, 2026 at 15:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 25 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the DICOM viewer state API (e.g. upload or state save/load) accepts a document ID (`doc_id`) without verifying that the document belongs to the current user’s authorized patient or encounter. An authenticated user can read or modify DICOM viewer state (e.g. annotations, view settings) for any document by enumerating document IDs. Version 8.0.0 fixes the issue.
Title OpenEMR Missing Authorization Checks in DICOM Viewer State API
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T21:33:41.716Z

Reserved: 2026-02-09T16:22:17.785Z

Link: CVE-2026-25927

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T19:43:22.757

Modified: 2026-02-27T14:40:46.690

Link: CVE-2026-25927

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:15:21Z

Weaknesses