Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, five insurance company REST API routes are missing the `RestConfig::request_authorization_check()` call that every other data-modifying route in the standard API uses. This allows any authenticated API user to create and modify insurance company records even if their OpenEMR user account does not have administrative ACL permissions. Version 8.0.0.3 patches the issue.
Published: 2026-03-25
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized modification of insurance company records
Action: Apply patch
AI Analysis

Impact

OpenEMR lacks proper ACL checks on five REST API routes that manage insurance company data. Because the required authorization call is omitted, any authenticated API user can create or modify these records without administrative ACL permissions. This flaw undermines data integrity for insurance records managed by OpenEMR.

Affected Systems

The vulnerability impacts all OpenEMR deployments running a version prior to 8.0.0.3. Any installation using the standard REST API interface is susceptible. Versions 8.0.0.3 and later contain a patch that restores the missing authorization checks.

Risk and Exploitability

The CVSS score of 5.4 indicates a medium severity. The EPSS score is below 1%, suggesting a low likelihood of exploitation. The vulnerability is not present in the CISA KEV catalog. Exploitation requires a valid API authentication token; with it, an attacker can perform data‑modifying operations on insurance company records with no additional privileges. Therefore, only authenticated users can abuse the flaw, and the attack vector is inferred to be API usage.

Generated by OpenCVE AI on March 26, 2026 at 18:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenEMR to version 8.0.0.3 or newer
  • Verify the upgrade by checking the application version and restarting the service
  • Confirm that the API endpoints no longer allow unauthorized modifications
  • Monitor system logs for unusual API activity

Generated by OpenCVE AI on March 26, 2026 at 18:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Wed, 25 Mar 2026 23:45:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, five insurance company REST API routes are missing the `RestConfig::request_authorization_check()` call that every other data-modifying route in the standard API uses. This allows any authenticated API user to create and modify insurance company records even if their OpenEMR user account does not have administrative ACL permissions. Version 8.0.0.3 patches the issue.
Title OpenEMR Missing ACL Checks on Insurance Company API Routes
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T15:02:43.569Z

Reserved: 2026-03-24T15:41:47.492Z

Link: CVE-2026-33915

cve-icon Vulnrichment

Updated: 2026-03-26T14:43:37.400Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T00:16:39.303

Modified: 2026-03-26T16:26:16.513

Link: CVE-2026-33915

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:29:23Z

Weaknesses