Description
OpenEMR is a free and open source electronic health records and medical practice management application. Versions up to and including 8.0.0.2 contain a SQL injection vulnerability in the patient selection feature that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the patient selection feature. Version 8.0.0.3 contains a patch.
Published: 2026-03-25
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Authenticated SQL Injection
Action: Apply Patch
AI Analysis

Impact

The flaw is an insufficiently validated input path in the patient selection feature of OpenEMR, producing a classic SQL injection weakness identified as CWE‑89. An attacker who has already authenticated to the OpenEMR instance could inject malicious SQL into the lookup query, potentially using it to read all patient records, alter existing entries, or execute other database commands. The consequence is a breach of patient confidentiality and integrity of health information, with the impact spanning the entire patient database for that installation.

Affected Systems

OpenEMR versions up to and including 8.0.0.2 are vulnerable. The vendor released a patch in version 8.0.0.3 that eliminates the flaw. All installations running the vulnerable releases should be updated, and any custom extensions affecting patient lookup should be audited for similar input handling.

Risk and Exploitability

The CVSS score of 7.2 classifies the risk as high, while the EPSS score of less than 1 % suggests a low probability of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog, further indicating limited public exploitation. Based on the description, it is inferred that the attacker must first obtain valid credentials and then interact with the patient selection interface, which is typically accessed over the web. Consequently, the attack vector is most likely internal or over a compromised user session, and the required prerequisites include authenticated access and the ability to submit arbitrary query parameters. The combined severity and exploitation conditions point to a significant threat that warrants prompt remediation.

Generated by OpenCVE AI on March 26, 2026 at 17:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenEMR to version 8.0.0.3 or later, which contains the official fix.
  • Restrict access to the patient selection feature to only those roles that absolutely need it, reducing the available surface for an attacker.
  • Audit any custom or third‑party modules that interact with patient data to ensure they do not re‑introduce similar input validation weaknesses.
  • Monitor database logs for anomalous or unexpected SQL statements that might indicate an injection attempt or misuse of the patient lookup function.

Generated by OpenCVE AI on March 26, 2026 at 17:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 25 Mar 2026 23:00:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Versions up to and including 8.0.0.2 contain a SQL injection vulnerability in the patient selection feature that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the patient selection feature. Version 8.0.0.3 contains a patch.
Title OpenEMR has a SQL Injection Vulnerability in patient selection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T19:52:11.910Z

Reserved: 2026-03-24T15:41:47.491Z

Link: CVE-2026-33910

cve-icon Vulnrichment

Updated: 2026-03-26T19:51:00.709Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T23:17:10.173

Modified: 2026-03-26T16:19:40.627

Link: CVE-2026-33910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:29:28Z

Weaknesses