Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `<xi:include href="file:///etc/passwd" parse="text"/>` to read arbitrary files from the server. Version 8.0.0.3 patches the issue.
Published: 2026-03-25
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read via XInclude Injection
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an authenticated user with permissions to the Carecoordination module to upload a specially crafted CCDA file that includes a XInclude payload. The payload specifies a local file path, enabling the user to read arbitrary files on the server such as /etc/passwd. The attack exploits XML External Entity import to disclose sensitive data, representing a confidentiality breach without execution privileges. It is classified as CWE-611.

Affected Systems

The flaw exists in OpenEMR versions earlier than 8.0.0.3. All installations running a vulnerable version and exposing the Carecoordination module are affected.

Risk and Exploitability

The CVSS score of 7.7 indicates high severity, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack path requires an authenticated user to construct and submit the malicious CCDA file; no elevated privileges or arbitrary code execution are required.

Generated by OpenCVE AI on March 26, 2026 at 17:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading OpenEMR to version 8.0.0.3 or later.
  • If an upgrade cannot be performed immediately, restrict access to the Carecoordination module or disable CCDA import functionality to prevent the upload of malicious documents.
  • Monitor CCDA import logs for abnormal activity and investigate any unexpected file inclusion attempts.

Generated by OpenCVE AI on March 26, 2026 at 17:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 25 Mar 2026 23:00:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `<xi:include href="file:///etc/passwd" parse="text"/>` to read arbitrary files from the server. Version 8.0.0.3 patches the issue.
Title OpenEMR: XInclude Injection in CCDA Import Allows Reading Arbitrary Server Files
Weaknesses CWE-611
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T18:08:31.010Z

Reserved: 2026-03-24T15:41:47.492Z

Link: CVE-2026-33913

cve-icon Vulnrichment

Updated: 2026-03-26T18:08:26.645Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T23:17:10.660

Modified: 2026-03-26T16:25:24.290

Link: CVE-2026-33913

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:29:25Z

Weaknesses