Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) updates by message/note ID only and does not verify that the message belongs to the current patient (or that the user is allowed to edit that patient’s notes). An authenticated user with notes permission can modify any patient’s messages by supplying another message ID. Commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41 contains a fix for the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | <= 8.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/commit/92a2ff9eaaa80674b3a934a6556e35e7aded5aPatch
- https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qhExploitVendor Advisory
- https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qhExploitVendor Advisory
FAQ
What is CVE-2026-25745?
CVE-2026-25745 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) upda...
How severe is CVE-2026-25745?
CVE-2026-25745 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25745?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.