Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiration check in `library/auth.inc.php` runs only when `skip_timeout_reset` is not present in the request. When `skip_timeout_reset=1` is sent, the entire block that calls `SessionTracker::isSessionExpired()` and forces logout on timeout is skipped. As a result, any request that includes this parameter (e.g. from auto-refresh pages like the Patient Flow Board) never runs the expiration check: expired sessions can continue to access data indefinitely, abandoned workstations stay active, and an attacker with a stolen session cookie can keep sending `skip_timeout_reset=1` to avoid being logged out. Version 8.0.0 fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | < 8.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/commit/02a6a7793402b10356a94626d78e0e1069e92aPatch
- https://github.com/openemr/openemr/security/advisories/GHSA-gx7q-6fhr-5h33ExploitVendor Advisory
- https://github.com/openemr/openemr/security/advisories/GHSA-gx7q-6fhr-5h33ExploitVendor Advisory
FAQ
What is CVE-2026-25476?
CVE-2026-25476 is a vulnerability with a CVSS score of 7.5 (HIGH). OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiration check in `library/auth.inc.php` runs only when `...
How severe is CVE-2026-25476?
CVE-2026-25476 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25476?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.