Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, missing authorization in the AJAX deletion endpoint `interface/forms/procedure_order/handle_deletions.php` allows any authenticated user, regardless of role, to irreversibly delete procedure orders, answers, and specimens belonging to any patient in the system. Version 8.0.0.3 patches the issue.
Published: 2026-03-25
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized deletion of patient procedure data
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the procedure order AJAX deletion endpoint allows any authenticated user to delete procedure orders, answers, and specimens belonging to any patient, resulting in irreversible data loss. This affects the integrity of medical records and could compromise patient care.

Affected Systems

All installations of OpenEMR prior to version 8.0.0.3 are affected. The vulnerability is present in the OpenEMR application and is accessed through the local web interface.

Risk and Exploitability

The CVSS score of 7.1 indicates moderate to high severity, and the EPSS score of less than 1% suggests low current exploitation probability. The issue is not listed in the CISA KEV catalog. An attacker only needs to be authenticated to the system; no elevated privileges are required. The lack of authorization checks on the deletion endpoint provides a straightforward attack path to remove sensitive patient data and disrupt operations.

Generated by OpenCVE AI on March 26, 2026 at 17:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading to OpenEMR 8.0.0.3 or later
  • Verify that only users with appropriate roles are granted access to the deletion functionality
  • Review and enforce role-based access controls to prevent accidental or intentional data removal

Generated by OpenCVE AI on March 26, 2026 at 17:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Open-emr
Open-emr openemr
CPEs cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Vendors & Products Open-emr
Open-emr openemr

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Openemr
Openemr openemr
Vendors & Products Openemr
Openemr openemr

Thu, 26 Mar 2026 00:00:00 +0000

Type Values Removed Values Added
Description OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, missing authorization in the AJAX deletion endpoint `interface/forms/procedure_order/handle_deletions.php` allows any authenticated user, regardless of role, to irreversibly delete procedure orders, answers, and specimens belonging to any patient in the system. Version 8.0.0.3 patches the issue.
Title OpenEMR Missing Authorization in Procedure Order AJAX Deletion Handler
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T15:02:37.508Z

Reserved: 2026-03-25T15:29:04.746Z

Link: CVE-2026-34053

cve-icon Vulnrichment

Updated: 2026-03-26T14:20:15.465Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T00:16:41.057

Modified: 2026-03-26T16:17:22.067

Link: CVE-2026-34053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:29:15Z

Weaknesses