Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the document controller’s `patient_picture` context serves the patient’s photo by document ID or patient ID without verifying that the current user is authorized to access that patient. An authenticated user with document ACL can supply another patient’s ID and retrieve their photo. Version 8.0.0 fixes the issue.
Published: 2026-02-25
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privacy Breach
Action: Patch
AI Analysis

Impact

The OpenEMR document controller’s patient_picture context served patient photos by document or patient ID without confirming that the requester was authorized to view that patient. This missing authorization check allows an authenticated user who has basic document ACL permissions to supply any patient identifier and retrieve another patient’s photo, exposing private medical data. The weakness is an access control flaw identified as CWE-639, leading to information disclosure that could compromise patient confidentiality.

Affected Systems

OpenEMR OpenEMR versions prior to 8.0.0 are affected. The vulnerability applies to all installations of the document controller’s patient_picture route where the application is running a version older than 8.0.0.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity vulnerability. EPSS is less than 1%, showing a very low likelihood of exploitation at the time of this assessment. The issue is not listed in the CISA KEV catalog. Exploitation requires a legitimate authenticated user who already has document ACL permissions; no additional privilege escalation is needed to request another patient's photo. Once authorized, the attacker can retrieve the photo directly through the patient_picture endpoint.

Generated by OpenCVE AI on April 17, 2026 at 15:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to OpenEMR 8.0.0 or newer, which adds proper authorization checks before serving patient photos.
  • After upgrading, audit and tighten document ACLs to enforce least‑privilege access for patient pictures, ensuring only authorized roles can request them.
  • If an immediate upgrade is not feasible, temporarily disable the patient_picture route or controller mapping to block unauthenticated access until the patch is applied.

Generated by OpenCVE AI on April 17, 2026 at 15:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 25 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the document controller’s `patient_picture` context serves the patient’s photo by document ID or patient ID without verifying that the current user is authorized to access that patient. An authenticated user with document ACL can supply another patient’s ID and retrieve their photo. Version 8.0.0 fixes the issue.
Title OpenEMR Patient Picture Context Allows Arbitrary Patient Photo Retrieval
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T21:33:41.863Z

Reserved: 2026-02-09T16:22:17.785Z

Link: CVE-2026-25929

cve-icon Vulnrichment

Updated: 2026-02-26T20:55:11.371Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T19:43:22.930

Modified: 2026-02-27T14:39:26.450

Link: CVE-2026-25929

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:15:21Z

Weaknesses