Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the Claim File Tracker feature exposes an AJAX endpoint that returns billing claim metadata (claim IDs, payer info, transmission logs). The endpoint does not enforce the same ACL as the main billing/claims workflow, so authenticated users without appropriate billing permissions can access this data. This vulnerability is fixed in 8.0.0.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | < 8.0.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/security/advisories/GHSA-rwf9-px3c-3prwExploitVendor Advisory
FAQ
What is CVE-2026-32122?
CVE-2026-32122 is a vulnerability with a CVSS score of 4.3 (MEDIUM). OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the Claim File Tracker feature exposes an AJAX endpoint that returns billing ...
How severe is CVE-2026-32122?
CVE-2026-32122 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32122?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.