Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | < 7.0.4 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/security/advisories/GHSA-5vp5-4rm6-h4c9ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-24848?
CVE-2026-24848 is a vulnerability with a CVSS score of 9.9 (CRITICAL). OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated ...
How severe is CVE-2026-24848?
CVE-2026-24848 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-24848?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.