Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, several variables in the MedEx recall/reminder processing code are concatenated directly into SQL queries without parameterization or type casting, enabling SQL injection. Version 8.0.0.3 contains a patch.
Published: 2026-03-25
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

OpenEMR versions prior to 8.0.0.3 contain a bug where several variables in the MedEx recall/reminder processing code are concatenated directly into SQL queries without proper sanitization or parameterization, creating a classic SQL injection flaw (CWE-89). Exploitation could allow an attacker to read, modify, or delete data from the underlying database, potentially exposing confidential patient information or corrupting clinical records. The CVSS score of 5.9 indicates a moderate severity that should not be ignored in a healthcare setting.

Affected Systems

The vulnerability affects the OpenEMR electronic health records platform. Any installation of version 8.0.0.2 or earlier is potentially compromised. Version 8.0.0.3 and later contain the necessary patch to eliminate the unsafe variable concatenations.

Risk and Exploitability

With a CVSS of 5.9 and an EPSS score of less than 1%, the likelihood of widespread exploitation is low, and it is not listed in the CISA KEV catalog. However, the attack vector is inferred to be through web interfaces that trigger MedEx recall or reminder processing, possibly requiring authenticated access. An attacker crafting malicious input into the relevant fields could inject arbitrary SQL commands into the backend database, provided they can reach the vulnerable endpoint. The mechanism relies on unsanitized inputs, which is a well-known, deterministic compromise path.

Generated by OpenCVE AI on March 26, 2026 at 19:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the exact OpenEMR version currently deployed.
  • Update OpenEMR to version 8.0.0.3 or later to apply the vendor patch.
  • After the update, restart the application to ensure the new code takes effect.
  • Confirm that the update is reflected in the application’s version information and that the MedEx recall/reminder URLs no longer accept unfiltered input.

Generated by OpenCVE AI on March 26, 2026 at 19:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 25 Mar 2026 23:00:00 +0000

Type Values Removed Values Added
References

Wed, 25 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, several variables in the MedEx recall/reminder processing code are concatenated directly into SQL queries without parameterization or type casting, enabling SQL injection. Version 8.0.0.3 contains a patch.
Title OpenEMR Vulnerable to SQL Injection via Unsanitized Variables in MedEx Recall/Reminder Processing
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T17:52:23.071Z

Reserved: 2026-03-24T15:41:47.491Z

Link: CVE-2026-33909

cve-icon Vulnrichment

Updated: 2026-03-26T17:52:18.916Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T23:17:10.007

Modified: 2026-03-26T18:02:01.233

Link: CVE-2026-33909

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:29:29Z

Weaknesses